insights-operator/gathers.json0000640000000000000000000004104015155003033015243 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":27,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":13,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":95,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":112,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":95,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":29,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":89,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":31392,"records_count":160,"errors":["function \"machine_autoscalers\" failed with an error","function \"pod_network_connectivity_checks\" failed with an error","function \"support_secret\" failed with an error","function \"tsdb_status\" failed with an error","function \"metrics\" failed with an error","function \"silenced_alerts\" failed with an error","function \"active_alerts\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-hjzms.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-hjzms/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-hjzms/etcd-operator_current.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-tlnkd.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rfqb9.json\""],"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":49,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":33,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":29,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":35,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":42,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":110,"records_count":9,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":22,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":239,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":48,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":37,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":91,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":190,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":703,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":25,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":32,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":28,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":36,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":55,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":31381,"records_count":74,"errors":["the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-hjzms.json\" was already recorded and had the fingerprint \"f45478c3544661b52644aee2963965d9e0f945878ef2744b02593c98c407c567\", overwriting with the record having fingerprint \"f45478c3544661b52644aee2963965d9e0f945878ef2744b02593c98c407c567\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-hjzms/etcd-operator_previous.log\" was already recorded and had the fingerprint \"bdbe74be626403694eea072f4ee73c9bbfb4994a1636427268154cbb132631fc\", overwriting with the record having fingerprint \"bdbe74be626403694eea072f4ee73c9bbfb4994a1636427268154cbb132631fc\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-hjzms/etcd-operator_current.log\" was already recorded and had the fingerprint \"05f6cf8cbf135213fca529ef5358bde6fbbd85b4e2eba4fb3d1fff971a0e9c3d\", overwriting with the record having fingerprint \"05f6cf8cbf135213fca529ef5358bde6fbbd85b4e2eba4fb3d1fff971a0e9c3d\"","the record with the same name \"config/pod/openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-tlnkd.json\" was already recorded and had the fingerprint \"1a39c8726368d55e58289376b099a4f0694455f77e9b63fe3ea8008d319c5e6a\", overwriting with the record having fingerprint \"1a39c8726368d55e58289376b099a4f0694455f77e9b63fe3ea8008d319c5e6a\"","the record with the same name \"config/pod/openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rfqb9.json\" was already recorded and had the fingerprint \"7847532e9ec66d235f7d1154ff651546399e032da20060e172f58f9a8cabdca2\", overwriting with the record having fingerprint \"7847532e9ec66d235f7d1154ff651546399e032da20060e172f58f9a8cabdca2\""],"warnings":["warning: the record with the same fingerprint \"f45478c3544661b52644aee2963965d9e0f945878ef2744b02593c98c407c567\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-hjzms.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-hjzms.json\"","warning: the record with the same fingerprint \"bdbe74be626403694eea072f4ee73c9bbfb4994a1636427268154cbb132631fc\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-hjzms/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-hjzms/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"05f6cf8cbf135213fca529ef5358bde6fbbd85b4e2eba4fb3d1fff971a0e9c3d\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-hjzms/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-hjzms/etcd-operator_current.log\"","warning: the record with the same fingerprint \"1a39c8726368d55e58289376b099a4f0694455f77e9b63fe3ea8008d319c5e6a\" was already recorded at path \"config/pod/openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-tlnkd.json\", recording another one with a different path \"config/pod/openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-tlnkd.json\"","warning: the record with the same fingerprint \"7847532e9ec66d235f7d1154ff651546399e032da20060e172f58f9a8cabdca2\" was already recorded at path \"config/pod/openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rfqb9.json\", recording another one with a different path \"config/pod/openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rfqb9.json\""],"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":20,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":111,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":24,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":30,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":29,"records_count":0,"errors":["machineautoscalers.autoscaling.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machineautoscalers\" in API group \"autoscaling.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":492,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":25517,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":23515,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":33,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":47,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":52,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":96,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":26,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":5429,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":5429,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":50,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":49,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":52,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":63,"records_count":5,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":48,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":123,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":504,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":53,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":29,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":38,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":39,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":38,"records_count":1,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":40.552,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515155003033017755 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515155003033021057 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005320415155003033014234 0ustar0000000000000000{"pods":78,"imageCount":64,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:4855408bd0e4d0711383d0c14dcad53c98255ff9f83f6cbefb57e47eacc1f1f1","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:27f5385c5b700fb400a618b51a628f0db39afa4a8db03380252ca5abf49518da","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b714a7ada1e295b599b432f32e1fd5b74c8cdbe6fe51e95306322b25cb873914","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:898c67bf7fc973e99114f3148976a6c21ae0dbe413051415588fa9b995f5b331","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:1295a1f0e74ae87f51a733e28b64c6fdb6b9a5b069a6897b3870fe52cc1c3b0b","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":1,"terminalCount":1,"shapes":[]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9bd0b71d620cf0acbfcd1b58797dc30050bd167cb6b7a7f62c8333dd370c76d5","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":1,"terminalCount":1,"shapes":[]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:042e6a37747405da54cf91543d44408c9531327a2cce653c41ca851aa7c896d8","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"Kt0qS5G8piJp":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","firstCommand":"9RqZYN0XQJuD"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b8cb5e0caeca0fb02f3e8c72b7ddf1c49e3c602e42e119ba30c60525f1db1821","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b9b8bc43bac294be3c7669cde049e388ad9d8751242051ba40f83e1c401eceda","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ebee49810f493f9b566740bd61256fd40b897cc51423f1efa01a02bb57ce177d","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d470dba32064cc62b2ab29303d6e00612304548262eaa2f4e5b40a00a26f71ce","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d470dba32064cc62b2ab29303d6e00612304548262eaa2f4e5b40a00a26f71ce","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:00b591b3820682dc99f16f07a3a0a4ec06dfedba63cd0f79b998ac4509fabea3","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:2508a5f66e509e813cb09825b5456be91b4cdd4d02f470f22a33de42c753f2b7","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","firstCommand":"zT6_GoC4_8OY","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"aC8iSHmKHojh","firstArg":"eE7ekwlit3Mq"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3bedf16a5f527126e934c37d2f24886de4a54c9bd9d45b18821d02eefd8b5f9e","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:bc516f6eb3028f5169f1712ac1878d4b591174fd7c363f4ee5aa63162aa01b0e","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:28f33d62fd0b94c5ea0ebcd7a4216848c8dd671a38d901ce98f4c399b700e1c7","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000011351615155003025033556 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-5c5f6764b5-96ktp2026-03-13T12:41:22.899481014Z W0313 12:41:22.899365 1 logging.go:55] [core] [Channel #4 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.42.194:50051: connect: connection refused" 2026-03-13T12:41:22.902231613Z I0313 12:41:22.902192 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T12:41:22.902347786Z I0313 12:41:22.902330 1 secure_serving.go:213] Serving securely on [::]:5443 2026-03-13T12:41:22.990805502Z I0313 12:41:22.990625 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T12:41:22.990805502Z I0313 12:41:22.990683 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T12:41:22.990805502Z I0313 12:41:22.990768 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T12:41:22.990805502Z I0313 12:41:22.990781 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T12:41:22.990844333Z I0313 12:41:22.990816 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T12:41:23.009272420Z I0313 12:41:22.997185 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T12:41:24.410756970Z W0313 12:41:23.889846 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.187.19:50051: connect: connection refused" 2026-03-13T12:41:24.410756970Z W0313 12:41:23.890056 1 logging.go:55] [core] [Channel #1 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.195.150:50051: connect: connection refused" 2026-03-13T12:41:24.410756970Z W0313 12:41:23.890315 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.4.69:50051: connect: connection refused" 2026-03-13T12:41:24.416108613Z W0313 12:41:24.416061 1 logging.go:55] [core] [Channel #4 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.42.194:50051: connect: connection refused" 2026-03-13T12:41:25.448433866Z W0313 12:41:25.448243 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.4.69:50051: connect: connection refused" 2026-03-13T12:41:25.450722243Z W0313 12:41:25.450689 1 logging.go:55] [core] [Channel #1 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.195.150:50051: connect: connection refused" 2026-03-13T12:41:25.581259704Z W0313 12:41:25.581200 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.187.19:50051: connect: connection refused" 2026-03-13T12:41:26.235353405Z W0313 12:41:26.235276 1 logging.go:55] [core] [Channel #4 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.42.194:50051: connect: connection refused" 2026-03-13T12:41:27.671065786Z W0313 12:41:27.670962 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.4.69:50051: connect: connection refused" 2026-03-13T12:41:28.576255292Z W0313 12:41:28.575933 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.187.19:50051: connect: connection refused" 2026-03-13T12:41:28.576255292Z W0313 12:41:28.576069 1 logging.go:55] [core] [Channel #1 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.195.150:50051: connect: connection refused" 2026-03-13T12:41:28.954017332Z W0313 12:41:28.953477 1 logging.go:55] [core] [Channel #4 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.42.194:50051: connect: connection refused" 2026-03-13T12:41:29.473128022Z E0313 12:41:29.450529 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.473128022Z E0313 12:41:29.451164 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.473128022Z E0313 12:41:29.451451 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.473128022Z E0313 12:41:29.451718 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.473128022Z E0313 12:41:29.451977 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.491987150Z E0313 12:41:29.491610 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.497901186Z E0313 12:41:29.497834 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.497998710Z E0313 12:41:29.497914 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.501823574Z E0313 12:41:29.501774 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.502058450Z E0313 12:41:29.501973 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.502221835Z E0313 12:41:29.502117 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.508229893Z E0313 12:41:29.507876 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.508267994Z E0313 12:41:29.508239 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.509627768Z E0313 12:41:29.508441 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.509627768Z E0313 12:41:29.508657 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.510050068Z E0313 12:41:29.509995 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.517598586Z E0313 12:41:29.517566 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.520449297Z E0313 12:41:29.520417 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.520756545Z E0313 12:41:29.520737 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.520922239Z E0313 12:41:29.520899 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.521073882Z E0313 12:41:29.521051 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.521275457Z E0313 12:41:29.521244 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.544725730Z E0313 12:41:29.544672 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.544725730Z E0313 12:41:29.544689 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.544804031Z E0313 12:41:29.544668 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.544890054Z E0313 12:41:29.544676 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.544898044Z E0313 12:41:29.544875 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.755017583Z E0313 12:41:29.754885 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.755985828Z E0313 12:41:29.755365 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.755985828Z E0313 12:41:29.755508 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.755985828Z E0313 12:41:29.755741 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.755985828Z E0313 12:41:29.755782 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.923787640Z E0313 12:41:29.923740 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.924028546Z E0313 12:41:29.924001 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.924188270Z E0313 12:41:29.924168 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.924394835Z E0313 12:41:29.924355 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:29.924530228Z E0313 12:41:29.924508 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:30.248055406Z E0313 12:41:30.247453 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:30.248055406Z E0313 12:41:30.247837 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:30.252100909Z E0313 12:41:30.251984 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:30.252277923Z E0313 12:41:30.252251 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:30.252760606Z E0313 12:41:30.252443 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:31.025575799Z E0313 12:41:31.025488 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:31.025621661Z E0313 12:41:31.025564 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:31.025621661Z E0313 12:41:31.025615 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:31.025728533Z E0313 12:41:31.025693 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:31.027158339Z E0313 12:41:31.027040 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:32.175291473Z W0313 12:41:32.175224 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.4.69:50051: connect: connection refused" 2026-03-13T12:41:32.321251712Z E0313 12:41:32.317788 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:32.321782335Z E0313 12:41:32.319923 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:32.323179790Z E0313 12:41:32.320061 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:32.323378535Z E0313 12:41:32.320294 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:32.323598641Z E0313 12:41:32.320415 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:33.004714580Z W0313 12:41:32.997403 1 logging.go:55] [core] [Channel #1 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.195.150:50051: connect: connection refused" 2026-03-13T12:41:33.232234070Z W0313 12:41:33.232181 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.187.19:50051: connect: connection refused" 2026-03-13T12:41:33.550115261Z W0313 12:41:33.550047 1 logging.go:55] [core] [Channel #4 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.42.194:50051: connect: connection refused" 2026-03-13T12:41:34.890299891Z E0313 12:41:34.890208 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:34.890363853Z E0313 12:41:34.890303 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:34.890505436Z E0313 12:41:34.890470 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:34.890589948Z E0313 12:41:34.890208 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:34.890655960Z E0313 12:41:34.890213 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.845736292Z E0313 12:41:37.845253 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.845736292Z E0313 12:41:37.845419 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.845736292Z E0313 12:41:37.845523 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.845736292Z E0313 12:41:37.845670 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.845736292Z E0313 12:41:37.845676 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:39.208630777Z W0313 12:41:39.208584 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.4.69:50051: connect: connection refused" 2026-03-13T12:41:39.587062905Z W0313 12:41:39.587020 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.187.19:50051: connect: connection refused" 2026-03-13T12:41:40.016530778Z E0313 12:41:40.016476 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:40.016779934Z E0313 12:41:40.016754 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:40.016911347Z E0313 12:41:40.016895 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:40.017052510Z E0313 12:41:40.017036 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:40.017216034Z E0313 12:41:40.017199 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:40.369622445Z W0313 12:41:40.369531 1 logging.go:55] [core] [Channel #1 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.195.150:50051: connect: connection refused" 2026-03-13T12:41:40.407257028Z W0313 12:41:40.407198 1 logging.go:55] [core] [Channel #4 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.42.194:50051: connect: connection refused" 2026-03-13T12:41:49.590600750Z W0313 12:41:49.590427 1 logging.go:55] [core] [Channel #1 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.195.150:50051: connect: connection refused" 2026-03-13T12:41:49.958723088Z W0313 12:41:49.958673 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.4.69:50051: connect: connection refused" 2026-03-13T12:41:52.006573610Z W0313 12:41:52.006513 1 logging.go:55] [core] [Channel #4 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.42.194:50051: connect: connection refused" 2026-03-13T12:41:52.145688855Z W0313 12:41:52.145608 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.187.19:50051: connect: connection refused" package-server-manager_current.log0000640000000000000000000005126115155003025036641 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-854648ff6d-669qk2026-03-13T12:38:42.073616422Z 2026-03-13T12:38:42Z INFO setup starting manager 2026-03-13T12:38:42.075810942Z 2026-03-13T12:38:42Z INFO controller-runtime.metrics Starting metrics server 2026-03-13T12:38:42.075835803Z 2026-03-13T12:38:42Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-03-13T12:38:42.075852284Z 2026-03-13T12:38:42Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-03-13T12:38:42.076032750Z 2026-03-13T12:38:42Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-03-13T12:38:42.078500580Z I0313 12:38:42.078387 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-03-13T12:39:42.080637081Z E0313 12:39:42.080519 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock) 2026-03-13T12:40:22.490292902Z I0313 12:40:22.489480 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-03-13T12:40:22.490677871Z 2026-03-13T12:40:22Z DEBUG events package-server-manager-854648ff6d-669qk_941569f9-0330-4829-bd92-132c950ecda0 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"e8bc0edf-8cd7-4f23-9a53-6693dfb3265c","apiVersion":"coordination.k8s.io/v1","resourceVersion":"8993"}, "reason": "LeaderElection"} 2026-03-13T12:40:22.493554636Z 2026-03-13T12:40:22Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-03-13T12:40:22.493554636Z 2026-03-13T12:40:22Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-03-13T12:40:22.493554636Z 2026-03-13T12:40:22Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-03-13T12:40:22.613382652Z 2026-03-13T12:40:22Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-03-13T12:40:22.613509195Z 2026-03-13T12:40:22Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-03-13T12:40:22.613708029Z 2026-03-13T12:40:22Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T12:40:22.613708029Z 2026-03-13T12:40:22Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:22.918025729Z 2026-03-13T12:40:22Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:22.918080550Z 2026-03-13T12:40:22Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T12:40:22.954231554Z 2026-03-13T12:40:22Z INFO controllers.packageserver attempting to create the packageserver csv 2026-03-13T12:40:22.959849621Z 2026-03-13T12:40:22Z INFO controllers.packageserver updating csv spec 2026-03-13T12:40:28.728975510Z 2026-03-13T12:40:28Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2026-03-13T12:40:28.728975510Z 2026-03-13T12:40:28Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:28.794604523Z 2026-03-13T12:40:28Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T12:40:28.794604523Z 2026-03-13T12:40:28Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:28.794676966Z 2026-03-13T12:40:28Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:28.794676966Z 2026-03-13T12:40:28Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T12:40:28.809460966Z 2026-03-13T12:40:28Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T12:40:28.809460966Z 2026-03-13T12:40:28Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:33.552165239Z 2026-03-13T12:40:33Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T12:40:33.552165239Z 2026-03-13T12:40:33Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:33.552223072Z 2026-03-13T12:40:33Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:33.552223072Z 2026-03-13T12:40:33Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T12:40:33.580433283Z 2026-03-13T12:40:33Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T12:40:33.580433283Z 2026-03-13T12:40:33Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:33.580558539Z 2026-03-13T12:40:33Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T12:40:33.580558539Z 2026-03-13T12:40:33Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:33.580701546Z 2026-03-13T12:40:33Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:33.580751209Z 2026-03-13T12:40:33Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T12:40:33.595413053Z 2026-03-13T12:40:33Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T12:40:33.595413053Z 2026-03-13T12:40:33Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:34.055558431Z 2026-03-13T12:40:34Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T12:40:34.055558431Z 2026-03-13T12:40:34Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:34.055558431Z 2026-03-13T12:40:34Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:34.055558431Z 2026-03-13T12:40:34Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T12:40:34.078601514Z 2026-03-13T12:40:34Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T12:40:34.078692248Z 2026-03-13T12:40:34Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:35.108258492Z 2026-03-13T12:40:35Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T12:40:35.108258492Z 2026-03-13T12:40:35Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:35.108298384Z 2026-03-13T12:40:35Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:35.108328636Z 2026-03-13T12:40:35Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T12:40:35.121836222Z 2026-03-13T12:40:35Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T12:40:35.121836222Z 2026-03-13T12:40:35Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:36.184545744Z 2026-03-13T12:40:36Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T12:40:36.184545744Z 2026-03-13T12:40:36Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:36.184623967Z 2026-03-13T12:40:36Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:36.184653259Z 2026-03-13T12:40:36Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T12:40:36.200165455Z 2026-03-13T12:40:36Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T12:40:36.200165455Z 2026-03-13T12:40:36Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:37.126031331Z 2026-03-13T12:40:37Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T12:40:37.126031331Z 2026-03-13T12:40:37Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:37.126031331Z 2026-03-13T12:40:37Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:37.126031331Z 2026-03-13T12:40:37Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T12:40:37.142998490Z 2026-03-13T12:40:37Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T12:40:37.142998490Z 2026-03-13T12:40:37Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:38.026539309Z 2026-03-13T12:40:38Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T12:40:38.026539309Z 2026-03-13T12:40:38Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:38.026574720Z 2026-03-13T12:40:38Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:38.026585631Z 2026-03-13T12:40:38Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T12:40:38.041090147Z 2026-03-13T12:40:38Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T12:40:38.041090147Z 2026-03-13T12:40:38Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:43.692477945Z 2026-03-13T12:40:43Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T12:40:43.692477945Z 2026-03-13T12:40:43Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:43.693191671Z 2026-03-13T12:40:43Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:43.693191671Z 2026-03-13T12:40:43Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T12:40:43.744913248Z 2026-03-13T12:40:43Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T12:40:43.744913248Z 2026-03-13T12:40:43Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:43.744980561Z 2026-03-13T12:40:43Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T12:40:43.744980561Z 2026-03-13T12:40:43Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:43.750129389Z 2026-03-13T12:40:43Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:43.750331819Z 2026-03-13T12:40:43Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T12:40:43.769760161Z 2026-03-13T12:40:43Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T12:40:43.770290407Z 2026-03-13T12:40:43Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:43.838328881Z 2026-03-13T12:40:43Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T12:40:43.838328881Z 2026-03-13T12:40:43Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:43.838433207Z 2026-03-13T12:40:43Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:43.838467448Z 2026-03-13T12:40:43Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T12:40:43.852833817Z 2026-03-13T12:40:43Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T12:40:43.852833817Z 2026-03-13T12:40:43Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:44.153764611Z 2026-03-13T12:40:44Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T12:40:44.153764611Z 2026-03-13T12:40:44Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:44.154692577Z 2026-03-13T12:40:44Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:44.154692577Z 2026-03-13T12:40:44Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T12:40:44.175895438Z 2026-03-13T12:40:44Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T12:40:44.175895438Z 2026-03-13T12:40:44Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:44.180106129Z 2026-03-13T12:40:44Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T12:40:44.180106129Z 2026-03-13T12:40:44Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:44.182316560Z 2026-03-13T12:40:44Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T12:40:44.182334841Z 2026-03-13T12:40:44Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T12:40:44.197929641Z 2026-03-13T12:40:44Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T12:40:44.197929641Z 2026-03-13T12:40:44Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} kube-rbac-proxy_current.log0000640000000000000000000000160415155003025035340 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-854648ff6d-669qk2026-03-13T12:38:31.743032843Z W0313 12:38:31.742845 1 deprecated.go:66] 2026-03-13T12:38:31.743032843Z ==== Removed Flag Warning ====================== 2026-03-13T12:38:31.743032843Z 2026-03-13T12:38:31.743032843Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-13T12:38:31.743032843Z 2026-03-13T12:38:31.743032843Z =============================================== 2026-03-13T12:38:31.743032843Z 2026-03-13T12:38:31.743394467Z I0313 12:38:31.743371 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-13T12:38:31.744520067Z I0313 12:38:31.744481 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-13T12:38:31.745451521Z I0313 12:38:31.745408 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-13T12:38:31.746851142Z I0313 12:38:31.745961 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 olm-operator_current.log0000640000000000000000000005177415155003025033357 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-d64cfc9db-rfqb92026-03-13T12:41:47.313834958Z time="2026-03-13T12:41:47Z" level=info msg="install strategy successful" csv=packageserver id=c/EMZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:47.343732085Z time="2026-03-13T12:41:47Z" level=info msg="install strategy successful" csv=packageserver id=MSIxl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:47.356106368Z time="2026-03-13T12:41:47Z" level=info msg="install strategy successful" csv=packageserver id=JgSzq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:47.574087212Z time="2026-03-13T12:41:47Z" level=info msg="install strategy successful" csv=packageserver id=aeDDy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:48.084711091Z time="2026-03-13T12:41:48Z" level=info msg="install strategy successful" csv=packageserver id=2VhlL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:48.107347725Z time="2026-03-13T12:41:48Z" level=info msg="install strategy successful" csv=packageserver id=BeSmx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:48.206046746Z time="2026-03-13T12:41:48Z" level=info msg="install strategy successful" csv=packageserver id=+onsp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:48.372352770Z time="2026-03-13T12:41:48Z" level=info msg="install strategy successful" csv=packageserver id=Zt/a0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:48.440375373Z time="2026-03-13T12:41:48Z" level=info msg="install strategy successful" csv=packageserver id=Li1cN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:48.546194335Z time="2026-03-13T12:41:48Z" level=info msg="install strategy successful" csv=packageserver id=+qFEy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:48.581302494Z time="2026-03-13T12:41:48Z" level=info msg="install strategy successful" csv=packageserver id=lGOP7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:48.589389430Z time="2026-03-13T12:41:48Z" level=info msg="install strategy successful" csv=packageserver id=Oq03F namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:48.642547137Z time="2026-03-13T12:41:48Z" level=info msg="install strategy successful" csv=packageserver id=AXFw1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:48.850020074Z time="2026-03-13T12:41:48Z" level=info msg="install strategy successful" csv=packageserver id=STt0I namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:49.024807013Z time="2026-03-13T12:41:49Z" level=info msg="install strategy successful" csv=packageserver id=1wHv3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:49.155261979Z time="2026-03-13T12:41:49Z" level=info msg="install strategy successful" csv=packageserver id=pKOr7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:49.236918727Z time="2026-03-13T12:41:49Z" level=info msg="install strategy successful" csv=packageserver id=1tWO0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:49.571343472Z time="2026-03-13T12:41:49Z" level=info msg="install strategy successful" csv=packageserver id=KN3nb namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:49.745314220Z time="2026-03-13T12:41:49Z" level=info msg="install strategy successful" csv=packageserver id=a4zBK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:49.844451792Z time="2026-03-13T12:41:49Z" level=info msg="install strategy successful" csv=packageserver id=EX7i6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:49.941825070Z time="2026-03-13T12:41:49Z" level=info msg="install strategy successful" csv=packageserver id=wh5J6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.044214514Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=bjks1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.141853129Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=TDvEJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.245634948Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=qXL1o namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.355128963Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=J/B8p namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.365255029Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=sagN1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.384994779Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=X334j namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.395377643Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=SXfiP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.402480683Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=yeIyX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.414255281Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=rDEf5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.428182884Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=CBTtl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.438263119Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=0RwKc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.446176680Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=2pXuc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.460204635Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=gqTvD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.464411522Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=oXFIR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.479239208Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=rx3AL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.488789029Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=ZZpCb namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.547574239Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=d88Y9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.706684661Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=TiUTH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.816789502Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=zhKXV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:50.909387518Z time="2026-03-13T12:41:50Z" level=info msg="install strategy successful" csv=packageserver id=MwKwl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:51.009536225Z time="2026-03-13T12:41:51Z" level=info msg="install strategy successful" csv=packageserver id=bWT0x namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:51.045758523Z time="2026-03-13T12:41:51Z" level=info msg="install strategy successful" csv=packageserver id=WGBFE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:51.183324359Z time="2026-03-13T12:41:51Z" level=info msg="install strategy successful" csv=packageserver id=eh3c/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:51.359509803Z time="2026-03-13T12:41:51Z" level=info msg="install strategy successful" csv=packageserver id=noxo6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:51.359509803Z time="2026-03-13T12:41:51Z" level=info msg="install strategy successful" csv=packageserver id=vqSm0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:51.453561906Z time="2026-03-13T12:41:51Z" level=info msg="install strategy successful" csv=packageserver id=lQIvU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:51.550708929Z time="2026-03-13T12:41:51Z" level=info msg="install strategy successful" csv=packageserver id=3lEso namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:51.656041028Z time="2026-03-13T12:41:51Z" level=info msg="install strategy successful" csv=packageserver id=VZkps namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:51.752276816Z time="2026-03-13T12:41:51Z" level=info msg="install strategy successful" csv=packageserver id=Mhjrb namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:51.854095387Z time="2026-03-13T12:41:51Z" level=info msg="install strategy successful" csv=packageserver id=ZBfU0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:51.953324050Z time="2026-03-13T12:41:51Z" level=info msg="install strategy successful" csv=packageserver id=xSdwr namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:52.063397810Z time="2026-03-13T12:41:52Z" level=info msg="install strategy successful" csv=packageserver id=eMvIS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:52.159193547Z time="2026-03-13T12:41:52Z" level=info msg="install strategy successful" csv=packageserver id=KD8y2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:52.260177997Z time="2026-03-13T12:41:52Z" level=info msg="install strategy successful" csv=packageserver id=61mke namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:52.345493698Z time="2026-03-13T12:41:52Z" level=info msg="install strategy successful" csv=packageserver id=+36bm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:52.447629346Z time="2026-03-13T12:41:52Z" level=info msg="install strategy successful" csv=packageserver id=Ynigk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:52.546504042Z time="2026-03-13T12:41:52Z" level=info msg="install strategy successful" csv=packageserver id=lc4r6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:52.645623854Z time="2026-03-13T12:41:52Z" level=info msg="install strategy successful" csv=packageserver id=a62n5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:52.745797041Z time="2026-03-13T12:41:52Z" level=info msg="install strategy successful" csv=packageserver id=xIV4v namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:52.852180077Z time="2026-03-13T12:41:52Z" level=info msg="install strategy successful" csv=packageserver id=yHnGF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:52.980490089Z time="2026-03-13T12:41:52Z" level=info msg="install strategy successful" csv=packageserver id=j5mTH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:53.089612754Z time="2026-03-13T12:41:53Z" level=info msg="install strategy successful" csv=packageserver id=tCsS/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:53.182003975Z time="2026-03-13T12:41:53Z" level=info msg="install strategy successful" csv=packageserver id=nvr0m namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:53.284459041Z time="2026-03-13T12:41:53Z" level=info msg="install strategy successful" csv=packageserver id=DI1Rt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:53.383592394Z time="2026-03-13T12:41:53Z" level=info msg="install strategy successful" csv=packageserver id=Z1ugx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:53.445305897Z time="2026-03-13T12:41:53Z" level=info msg="install strategy successful" csv=packageserver id=IaXwd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:53.545126386Z time="2026-03-13T12:41:53Z" level=info msg="install strategy successful" csv=packageserver id=WC9fC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:53.707060780Z time="2026-03-13T12:41:53Z" level=info msg="install strategy successful" csv=packageserver id=+TrfM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:53.806085960Z time="2026-03-13T12:41:53Z" level=info msg="install strategy successful" csv=packageserver id=xO8OT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:53.906011721Z time="2026-03-13T12:41:53Z" level=info msg="install strategy successful" csv=packageserver id=WLFdj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:54.006776165Z time="2026-03-13T12:41:54Z" level=info msg="install strategy successful" csv=packageserver id=/ix83 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:54.045503047Z time="2026-03-13T12:41:54Z" level=info msg="install strategy successful" csv=packageserver id=9FvVt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:54.145869229Z time="2026-03-13T12:41:54Z" level=info msg="install strategy successful" csv=packageserver id=az85z namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:54.284843481Z time="2026-03-13T12:41:54Z" level=info msg="install strategy successful" csv=packageserver id=2C2DO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:54.382879026Z time="2026-03-13T12:41:54Z" level=info msg="install strategy successful" csv=packageserver id=7HpJp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:54.845187790Z time="2026-03-13T12:41:54Z" level=info msg="install strategy successful" csv=packageserver id=zp7MD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:54.946857796Z time="2026-03-13T12:41:54Z" level=info msg="install strategy successful" csv=packageserver id=knUqD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:55.003359708Z time="2026-03-13T12:41:55Z" level=info msg="install strategy successful" csv=packageserver id=n+rkm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:55.011382202Z time="2026-03-13T12:41:55Z" level=info msg="install strategy successful" csv=packageserver id=2mHue namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:55.020092342Z time="2026-03-13T12:41:55Z" level=info msg="install strategy successful" csv=packageserver id=E6ftx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:55.025335175Z time="2026-03-13T12:41:55Z" level=info msg="install strategy successful" csv=packageserver id=AcSEg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:55.046478161Z time="2026-03-13T12:41:55Z" level=info msg="install strategy successful" csv=packageserver id=f2L4m namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:55.144626068Z time="2026-03-13T12:41:55Z" level=info msg="install strategy successful" csv=packageserver id=eQEVY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:55.244538870Z time="2026-03-13T12:41:55Z" level=info msg="install strategy successful" csv=packageserver id=R8g96 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:55.347515209Z time="2026-03-13T12:41:55Z" level=info msg="install strategy successful" csv=packageserver id=TsIHU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:55.446063046Z time="2026-03-13T12:41:55Z" level=info msg="install strategy successful" csv=packageserver id=WTQ9k namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:55.547067906Z time="2026-03-13T12:41:55Z" level=info msg="install strategy successful" csv=packageserver id=j80xg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:55.648473476Z time="2026-03-13T12:41:55Z" level=info msg="install strategy successful" csv=packageserver id=usGFu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:55.749118125Z time="2026-03-13T12:41:55Z" level=info msg="install strategy successful" csv=packageserver id=sHnsQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:55.845370594Z time="2026-03-13T12:41:55Z" level=info msg="install strategy successful" csv=packageserver id=6dEPg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:55.945798230Z time="2026-03-13T12:41:55Z" level=info msg="install strategy successful" csv=packageserver id=yOboc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:56.046111842Z time="2026-03-13T12:41:56Z" level=info msg="install strategy successful" csv=packageserver id=Qx6dj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:56.145425917Z time="2026-03-13T12:41:56Z" level=info msg="install strategy successful" csv=packageserver id=pARLy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:56.244915139Z time="2026-03-13T12:41:56Z" level=info msg="install strategy successful" csv=packageserver id=/pOnl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:56.346464122Z time="2026-03-13T12:41:56Z" level=info msg="install strategy successful" csv=packageserver id=rKaXL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:56.446567289Z time="2026-03-13T12:41:56Z" level=info msg="install strategy successful" csv=packageserver id=HOfLs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:56.545722981Z time="2026-03-13T12:41:56Z" level=info msg="install strategy successful" csv=packageserver id=5LY46 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:56.645776097Z time="2026-03-13T12:41:56Z" level=info msg="install strategy successful" csv=packageserver id=RdrbU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T12:41:56.745446542Z time="2026-03-13T12:41:56Z" level=info msg="install strategy successful" csv=packageserver id=ivIBI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment olm-operator_previous.log0000640000000000000000000000113415155003025033532 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-d64cfc9db-rfqb92026-03-13T12:38:38.915676990Z time="2026-03-13T12:38:38Z" level=info msg="log level info" 2026-03-13T12:38:38.915834066Z time="2026-03-13T12:38:38Z" level=info msg="TLS keys set, using https for metrics" 2026-03-13T12:38:38.916021772Z time="2026-03-13T12:38:38Z" level=info msg="No client CA provided, client certificate verification disabled" 2026-03-13T12:39:38.946929661Z time="2026-03-13T12:39:38Z" level=fatal msg="error configuring operator" error="the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com)" config/pod/openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rfqb9.json0000640000000000000000000001506715155003025026473 0ustar0000000000000000{"metadata":{"name":"olm-operator-d64cfc9db-rfqb9","generateName":"olm-operator-d64cfc9db-","namespace":"openshift-operator-lifecycle-manager","uid":"d5a19b80-d488-46d3-a4a8-0b80361077e1","resourceVersion":"9164","creationTimestamp":"2026-03-13T12:35:30Z","labels":{"app":"olm-operator","pod-template-hash":"d64cfc9db"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.23/23\"],\"mac_address\":\"0a:58:0a:80:00:17\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.23/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.23\"\n ],\n \"mac\": \"0a:58:0a:80:00:17\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"olm-operator-d64cfc9db","uid":"32fcb2ad-1527-4c32-bf52-4435cdf6c553","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"srv-cert","secret":{"secretName":"olm-operator-serving-cert","defaultMode":420}},{"name":"kube-api-access-p8hcd","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"olm-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","command":["/bin/olm"],"args":["--namespace","$(OPERATOR_NAMESPACE)","--writeStatusName","operator-lifecycle-manager","--writePackageServerStatusName","operator-lifecycle-manager-packageserver","--tls-cert","/srv-cert/tls.crt","--tls-key","/srv-cert/tls.key","--protectedCopiedCSVNamespaces","openshift"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"OPERATOR_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"OPERATOR_NAME","value":"olm-operator"},{"name":"RELEASE_VERSION","value":"4.18.34"}],"resources":{"requests":{"cpu":"10m","memory":"160Mi"}},"volumeMounts":[{"name":"srv-cert","readOnly":true,"mountPath":"/srv-cert"},{"name":"kube-api-access-p8hcd","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"olm-operator-serviceaccount","serviceAccount":"olm-operator-serviceaccount","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c20,c10"},"runAsNonRoot":true,"fsGroup":1000400000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:39Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.23","podIPs":[{"ip":"10.128.0.23"}],"startTime":"2026-03-13T12:37:21Z","containerStatuses":[{"name":"olm-operator","state":{"running":{"startedAt":"2026-03-13T12:40:13Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"time=\"2026-03-13T12:38:38Z\" level=info msg=\"log level info\"\ntime=\"2026-03-13T12:38:38Z\" level=info msg=\"TLS keys set, using https for metrics\"\ntime=\"2026-03-13T12:38:38Z\" level=info msg=\"No client CA provided, client certificate verification disabled\"\ntime=\"2026-03-13T12:39:38Z\" level=fatal msg=\"error configuring operator\" error=\"the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com)\"\n","startedAt":"2026-03-13T12:38:38Z","finishedAt":"2026-03-13T12:39:38Z","containerID":"cri-o://47e1707cfebdcd64e29e4d18bf48d4efe18567479faf12290a7bcd51f3b4d7e2"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","containerID":"cri-o://f0c5b3dc40b8343911cfdf5960a0b2222b935ca610668092d6c826c6950bc761","started":true,"volumeMounts":[{"name":"srv-cert","mountPath":"/srv-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-p8hcd","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}catalog-operator_current.log0000640000000000000000000005755015155003025035053 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-7d9c49f57b-tlnkd2026-03-13T12:41:26.073576539Z time="2026-03-13T12:41:26Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-zh888 current-pod.namespace=openshift-marketplace id=fT+sD 2026-03-13T12:41:26.073576539Z time="2026-03-13T12:41:26Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=fT+sD 2026-03-13T12:41:26.073576539Z time="2026-03-13T12:41:26Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=fT+sD 2026-03-13T12:41:26.073576539Z time="2026-03-13T12:41:26Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=fT+sD 2026-03-13T12:41:26.110858294Z time="2026-03-13T12:41:26Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=fT+sD 2026-03-13T12:41:26.110971387Z time="2026-03-13T12:41:26Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-zh888 current-pod.namespace=openshift-marketplace id=fT+sD 2026-03-13T12:41:26.110997647Z time="2026-03-13T12:41:26Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-zh888 current-pod.namespace=openshift-marketplace id=fT+sD 2026-03-13T12:41:26.111109071Z time="2026-03-13T12:41:26Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=fT+sD 2026-03-13T12:41:26.111109071Z time="2026-03-13T12:41:26Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=fT+sD 2026-03-13T12:41:29.264336528Z time="2026-03-13T12:41:29Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=4r3Fk 2026-03-13T12:41:29.264388619Z time="2026-03-13T12:41:29Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=4r3Fk 2026-03-13T12:41:29.283785811Z time="2026-03-13T12:41:29Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=4r3Fk 2026-03-13T12:41:29.283916044Z time="2026-03-13T12:41:29Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-p9csk current-pod.namespace=openshift-marketplace id=4r3Fk 2026-03-13T12:41:29.283925654Z time="2026-03-13T12:41:29Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-p9csk current-pod.namespace=openshift-marketplace id=4r3Fk 2026-03-13T12:41:29.283945345Z time="2026-03-13T12:41:29Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=4r3Fk 2026-03-13T12:41:29.283945345Z time="2026-03-13T12:41:29Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=4r3Fk 2026-03-13T12:41:29.283953145Z time="2026-03-13T12:41:29Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=4r3Fk 2026-03-13T12:41:29.310154505Z time="2026-03-13T12:41:29Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=pLaO5 2026-03-13T12:41:29.310228116Z time="2026-03-13T12:41:29Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=pLaO5 2026-03-13T12:41:29.326712386Z time="2026-03-13T12:41:29Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=4r3Fk 2026-03-13T12:41:29.326812818Z time="2026-03-13T12:41:29Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=pLaO5 2026-03-13T12:41:29.326849049Z time="2026-03-13T12:41:29Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-p9csk current-pod.namespace=openshift-marketplace id=4r3Fk 2026-03-13T12:41:29.326856969Z time="2026-03-13T12:41:29Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-p9csk current-pod.namespace=openshift-marketplace id=4r3Fk 2026-03-13T12:41:29.326940331Z time="2026-03-13T12:41:29Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-5czx2 current-pod.namespace=openshift-marketplace id=pLaO5 2026-03-13T12:41:29.326975872Z time="2026-03-13T12:41:29Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=4r3Fk 2026-03-13T12:41:29.326983992Z time="2026-03-13T12:41:29Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=4r3Fk 2026-03-13T12:41:29.327020313Z time="2026-03-13T12:41:29Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-5czx2 current-pod.namespace=openshift-marketplace id=pLaO5 2026-03-13T12:41:29.327063444Z time="2026-03-13T12:41:29Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=pLaO5 2026-03-13T12:41:29.327086915Z time="2026-03-13T12:41:29Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=pLaO5 2026-03-13T12:41:29.327109445Z time="2026-03-13T12:41:29Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=pLaO5 2026-03-13T12:41:29.346521168Z time="2026-03-13T12:41:29Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=pLaO5 2026-03-13T12:41:29.346732503Z time="2026-03-13T12:41:29Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-5czx2 current-pod.namespace=openshift-marketplace id=pLaO5 2026-03-13T12:41:29.346768305Z time="2026-03-13T12:41:29Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-5czx2 current-pod.namespace=openshift-marketplace id=pLaO5 2026-03-13T12:41:29.346905638Z time="2026-03-13T12:41:29Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=pLaO5 2026-03-13T12:41:29.346934149Z time="2026-03-13T12:41:29Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=pLaO5 2026-03-13T12:41:30.224811078Z time="2026-03-13T12:41:30Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rRRQv 2026-03-13T12:41:30.224811078Z time="2026-03-13T12:41:30Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rRRQv 2026-03-13T12:41:30.233099598Z time="2026-03-13T12:41:30Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rRRQv 2026-03-13T12:41:30.233099598Z time="2026-03-13T12:41:30Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-5czx2 current-pod.namespace=openshift-marketplace id=rRRQv 2026-03-13T12:41:30.233099598Z time="2026-03-13T12:41:30Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-5czx2 current-pod.namespace=openshift-marketplace id=rRRQv 2026-03-13T12:41:30.233099598Z time="2026-03-13T12:41:30Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=rRRQv 2026-03-13T12:41:30.233099598Z time="2026-03-13T12:41:30Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rRRQv 2026-03-13T12:41:30.233099598Z time="2026-03-13T12:41:30Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rRRQv 2026-03-13T12:41:30.278911548Z time="2026-03-13T12:41:30Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rRRQv 2026-03-13T12:41:30.278911548Z time="2026-03-13T12:41:30Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-5czx2 current-pod.namespace=openshift-marketplace id=rRRQv 2026-03-13T12:41:30.278911548Z time="2026-03-13T12:41:30Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-5czx2 current-pod.namespace=openshift-marketplace id=rRRQv 2026-03-13T12:41:30.278911548Z time="2026-03-13T12:41:30Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rRRQv 2026-03-13T12:41:30.278911548Z time="2026-03-13T12:41:30Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rRRQv 2026-03-13T12:41:47.472125668Z time="2026-03-13T12:41:47Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=TKqrz 2026-03-13T12:41:47.472259652Z time="2026-03-13T12:41:47Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=TKqrz 2026-03-13T12:41:47.570330097Z time="2026-03-13T12:41:47Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=TKqrz 2026-03-13T12:41:47.570330097Z time="2026-03-13T12:41:47Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-9x9vk current-pod.namespace=openshift-marketplace id=TKqrz 2026-03-13T12:41:47.570330097Z time="2026-03-13T12:41:47Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-9x9vk current-pod.namespace=openshift-marketplace id=TKqrz 2026-03-13T12:41:47.570330097Z time="2026-03-13T12:41:47Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=TKqrz 2026-03-13T12:41:47.570330097Z time="2026-03-13T12:41:47Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=TKqrz 2026-03-13T12:41:47.570330097Z time="2026-03-13T12:41:47Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=TKqrz 2026-03-13T12:41:48.077569130Z time="2026-03-13T12:41:47Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=WThAj 2026-03-13T12:41:48.077569130Z time="2026-03-13T12:41:47Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=WThAj 2026-03-13T12:41:48.077569130Z time="2026-03-13T12:41:47Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=WThAj 2026-03-13T12:41:48.077569130Z time="2026-03-13T12:41:47Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-zh888 current-pod.namespace=openshift-marketplace id=WThAj 2026-03-13T12:41:48.077569130Z time="2026-03-13T12:41:47Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-zh888 current-pod.namespace=openshift-marketplace id=WThAj 2026-03-13T12:41:48.077569130Z time="2026-03-13T12:41:47Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=WThAj 2026-03-13T12:41:48.077569130Z time="2026-03-13T12:41:47Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=WThAj 2026-03-13T12:41:48.077569130Z time="2026-03-13T12:41:47Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=WThAj 2026-03-13T12:41:48.077569130Z time="2026-03-13T12:41:47Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=TKqrz 2026-03-13T12:41:48.077569130Z time="2026-03-13T12:41:47Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-9x9vk current-pod.namespace=openshift-marketplace id=TKqrz 2026-03-13T12:41:48.077569130Z time="2026-03-13T12:41:47Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-9x9vk current-pod.namespace=openshift-marketplace id=TKqrz 2026-03-13T12:41:48.077569130Z time="2026-03-13T12:41:47Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=TKqrz 2026-03-13T12:41:48.077569130Z time="2026-03-13T12:41:47Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=TKqrz 2026-03-13T12:41:48.081359256Z time="2026-03-13T12:41:48Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9mTp2 2026-03-13T12:41:48.081359256Z time="2026-03-13T12:41:48Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9mTp2 2026-03-13T12:41:48.094293024Z time="2026-03-13T12:41:48Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=WThAj 2026-03-13T12:41:48.094293024Z time="2026-03-13T12:41:48Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-zh888 current-pod.namespace=openshift-marketplace id=WThAj 2026-03-13T12:41:48.094293024Z time="2026-03-13T12:41:48Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-zh888 current-pod.namespace=openshift-marketplace id=WThAj 2026-03-13T12:41:48.094293024Z time="2026-03-13T12:41:48Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=WThAj 2026-03-13T12:41:48.094293024Z time="2026-03-13T12:41:48Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=WThAj 2026-03-13T12:41:48.094293024Z time="2026-03-13T12:41:48Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9mTp2 2026-03-13T12:41:48.094293024Z time="2026-03-13T12:41:48Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-p9csk current-pod.namespace=openshift-marketplace id=9mTp2 2026-03-13T12:41:48.094293024Z time="2026-03-13T12:41:48Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-p9csk current-pod.namespace=openshift-marketplace id=9mTp2 2026-03-13T12:41:48.094293024Z time="2026-03-13T12:41:48Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=9mTp2 2026-03-13T12:41:48.094293024Z time="2026-03-13T12:41:48Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9mTp2 2026-03-13T12:41:48.094293024Z time="2026-03-13T12:41:48Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9mTp2 2026-03-13T12:41:48.120856567Z time="2026-03-13T12:41:48Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=8nHrN 2026-03-13T12:41:48.120928328Z time="2026-03-13T12:41:48Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=8nHrN 2026-03-13T12:41:48.822056435Z time="2026-03-13T12:41:48Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9mTp2 2026-03-13T12:41:48.822198519Z time="2026-03-13T12:41:48Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-p9csk current-pod.namespace=openshift-marketplace id=9mTp2 2026-03-13T12:41:48.822198519Z time="2026-03-13T12:41:48Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-p9csk current-pod.namespace=openshift-marketplace id=9mTp2 2026-03-13T12:41:48.826182630Z time="2026-03-13T12:41:48Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9mTp2 2026-03-13T12:41:48.826182630Z time="2026-03-13T12:41:48Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9mTp2 2026-03-13T12:41:48.878127466Z time="2026-03-13T12:41:48Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=8nHrN 2026-03-13T12:41:48.878127466Z time="2026-03-13T12:41:48Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-5czx2 current-pod.namespace=openshift-marketplace id=8nHrN 2026-03-13T12:41:48.878127466Z time="2026-03-13T12:41:48Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-5czx2 current-pod.namespace=openshift-marketplace id=8nHrN 2026-03-13T12:41:48.878127466Z time="2026-03-13T12:41:48Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=8nHrN 2026-03-13T12:41:48.878127466Z time="2026-03-13T12:41:48Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=8nHrN 2026-03-13T12:41:48.878127466Z time="2026-03-13T12:41:48Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=8nHrN 2026-03-13T12:41:49.551819637Z time="2026-03-13T12:41:49Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=8nHrN 2026-03-13T12:41:49.553430907Z time="2026-03-13T12:41:49Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-5czx2 current-pod.namespace=openshift-marketplace id=8nHrN 2026-03-13T12:41:49.553430907Z time="2026-03-13T12:41:49Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-5czx2 current-pod.namespace=openshift-marketplace id=8nHrN 2026-03-13T12:41:49.553430907Z time="2026-03-13T12:41:49Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=8nHrN 2026-03-13T12:41:49.553430907Z time="2026-03-13T12:41:49Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=8nHrN catalog-operator_previous.log0000640000000000000000000000253015155003025035231 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-7d9c49f57b-tlnkd2026-03-13T12:38:38.932922588Z time="2026-03-13T12:38:38Z" level=info msg="log level info" 2026-03-13T12:38:38.933217149Z time="2026-03-13T12:38:38Z" level=info msg="TLS keys set, using https for metrics" 2026-03-13T12:38:38.933564501Z time="2026-03-13T12:38:38Z" level=info msg="No client CA provided, client certificate verification disabled" 2026-03-13T12:38:38.933611273Z W0313 12:38:38.933576 1 client_config.go:659] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work. 2026-03-13T12:38:38.934010267Z time="2026-03-13T12:38:38Z" level=info msg="Using in-cluster kube client config" 2026-03-13T12:38:38.934694143Z time="2026-03-13T12:38:38Z" level=info msg="Using in-cluster kube client config" 2026-03-13T12:38:38.934851108Z W0313 12:38:38.934827 1 client_config.go:659] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work. 2026-03-13T12:39:38.944742042Z Error: error configuring catalog operator: the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com) 2026-03-13T12:39:38.944742042Z error configuring catalog operator: the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com) config/pod/openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-tlnkd.json0000640000000000000000000001656015155003025027345 0ustar0000000000000000{"metadata":{"name":"catalog-operator-7d9c49f57b-tlnkd","generateName":"catalog-operator-7d9c49f57b-","namespace":"openshift-operator-lifecycle-manager","uid":"10944f9c-8ce9-44e6-9c36-a0ea19d8cae3","resourceVersion":"9157","creationTimestamp":"2026-03-13T12:35:29Z","labels":{"app":"catalog-operator","pod-template-hash":"7d9c49f57b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.20/23\"],\"mac_address\":\"0a:58:0a:80:00:14\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.20/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.20\"\n ],\n \"mac\": \"0a:58:0a:80:00:14\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalog-operator-7d9c49f57b","uid":"147787f6-bd90-4947-a32e-4b10d8d07809","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"srv-cert","secret":{"secretName":"catalog-operator-serving-cert","defaultMode":420}},{"name":"kube-api-access-zbk4f","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"catalog-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","command":["/bin/catalog"],"args":["--namespace","openshift-marketplace","--configmapServerImage=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","--opmImage=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","--util-image","quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","--writeStatusName","operator-lifecycle-manager-catalog","--tls-cert","/srv-cert/tls.crt","--tls-key","/srv-cert/tls.key","--set-workload-user-id=false"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"}],"resources":{"requests":{"cpu":"10m","memory":"80Mi"}},"volumeMounts":[{"name":"srv-cert","readOnly":true,"mountPath":"/srv-cert"},{"name":"kube-api-access-zbk4f","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"olm-operator-serviceaccount","serviceAccount":"olm-operator-serviceaccount","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c20,c10"},"runAsNonRoot":true,"fsGroup":1000400000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:39Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.20","podIPs":[{"ip":"10.128.0.20"}],"startTime":"2026-03-13T12:37:21Z","containerStatuses":[{"name":"catalog-operator","state":{"running":{"startedAt":"2026-03-13T12:40:13Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"time=\"2026-03-13T12:38:38Z\" level=info msg=\"log level info\"\ntime=\"2026-03-13T12:38:38Z\" level=info msg=\"TLS keys set, using https for metrics\"\ntime=\"2026-03-13T12:38:38Z\" level=info msg=\"No client CA provided, client certificate verification disabled\"\nW0313 12:38:38.933576 1 client_config.go:659] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work.\ntime=\"2026-03-13T12:38:38Z\" level=info msg=\"Using in-cluster kube client config\"\ntime=\"2026-03-13T12:38:38Z\" level=info msg=\"Using in-cluster kube client config\"\nW0313 12:38:38.934827 1 client_config.go:659] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work.\nError: error configuring catalog operator: the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com)\nerror configuring catalog operator: the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com)\n","startedAt":"2026-03-13T12:38:38Z","finishedAt":"2026-03-13T12:39:38Z","containerID":"cri-o://9d05f0d44d2a573355b6b4eea02a702f641e31e420669a5e155b6a442793e880"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","containerID":"cri-o://6828090d49f9735dd2442fd56a0db3f01a6e5cb451ce737e8263267c628730cb","started":true,"volumeMounts":[{"name":"srv-cert","mountPath":"/srv-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-zbk4f","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-hjzms/etcd-operator_current.log0000640000000000000000000001055315155003025031241 0ustar00000000000000002026-03-13T12:40:14.298009027Z I0313 12:40:14.297753 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-03-13T12:40:14.298199911Z I0313 12:40:14.298034 1 observer_polling.go:159] Starting file observer 2026-03-13T12:40:14.298557620Z I0313 12:40:14.298510 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T12:40:14.298587850Z I0313 12:40:14.298558 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T12:40:14.298995309Z I0313 12:40:14.298957 1 observer_polling.go:159] Starting file observer 2026-03-13T12:40:27.165990922Z I0313 12:40:27.164554 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602170912.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934 2026-03-13T12:40:27.615336260Z I0313 12:40:27.611873 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T12:40:27.615428235Z W0313 12:40:27.615408 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T12:40:27.615459896Z W0313 12:40:27.615448 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T12:40:27.615491518Z W0313 12:40:27.615479 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T12:40:27.615520069Z W0313 12:40:27.615509 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T12:40:27.627093308Z W0313 12:40:27.627038 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T12:40:27.627093308Z W0313 12:40:27.627058 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T12:40:27.627457496Z I0313 12:40:27.626985 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T12:40:27.628733070Z I0313 12:40:27.628702 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... 2026-03-13T12:40:27.634664006Z I0313 12:40:27.632770 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T12:40:27.634664006Z I0313 12:40:27.632822 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T12:40:27.634664006Z I0313 12:40:27.632880 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T12:40:27.634664006Z I0313 12:40:27.632894 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T12:40:27.634664006Z I0313 12:40:27.632907 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T12:40:27.634664006Z I0313 12:40:27.632912 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T12:40:27.634664006Z I0313 12:40:27.633200 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T12:40:27.634664006Z I0313 12:40:27.633274 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T12:40:27.634664006Z I0313 12:40:27.633432 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T12:40:27.733885730Z I0313 12:40:27.733265 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T12:40:27.733885730Z I0313 12:40:27.733365 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T12:40:27.733885730Z I0313 12:40:27.733497 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-hjzms/etcd-operator_previous.log0000640000000000000000000004431215155003025031433 0ustar00000000000000002026-03-13T12:38:59.885185945Z I0313 12:38:59.885043 1 base_controller.go:113] All DefragController workers have been terminated 2026-03-13T12:38:59.885185945Z I0313 12:38:59.885053 1 base_controller.go:123] Shutting down worker of etcd-UnsupportedConfigOverrides controller ... 2026-03-13T12:38:59.885185945Z I0313 12:38:59.885063 1 base_controller.go:113] All etcd-UnsupportedConfigOverrides workers have been terminated 2026-03-13T12:38:59.885185945Z I0313 12:38:59.885103 1 base_controller.go:181] Shutting down ScriptController ... 2026-03-13T12:38:59.885311070Z I0313 12:38:59.885270 1 base_controller.go:181] Shutting down GuardController ... 2026-03-13T12:38:59.885311070Z I0313 12:38:59.885304 1 base_controller.go:181] Shutting down ClusterMemberController ... 2026-03-13T12:38:59.885341421Z I0313 12:38:59.885325 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-13T12:38:59.885351111Z I0313 12:38:59.885341 1 base_controller.go:181] Shutting down etcd-InstallerState ... 2026-03-13T12:38:59.885360201Z I0313 12:38:59.885350 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-13T12:38:59.885465845Z E0313 12:38:59.885443 1 base_controller.go:279] "Unhandled Error" err="etcd-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/pods?labelSelector=app%3Dinstaller\": context canceled" 2026-03-13T12:38:59.885505987Z I0313 12:38:59.885490 1 base_controller.go:181] Shutting down Installer ... 2026-03-13T12:38:59.885515137Z I0313 12:38:59.885507 1 base_controller.go:181] Shutting down etcd-StaticPodState ... 2026-03-13T12:38:59.885584539Z I0313 12:38:59.885561 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-13T12:38:59.885596220Z I0313 12:38:59.885589 1 base_controller.go:181] Shutting down EtcdCertSignerController ... 2026-03-13T12:38:59.885719664Z E0313 12:38:59.885682 1 base_controller.go:279] "Unhandled Error" err="EtcdCertSignerController reconciliation failed: could not get current etcd-all-bundles configmap Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-all-bundles\": context canceled" 2026-03-13T12:38:59.885730335Z I0313 12:38:59.885722 1 base_controller.go:181] Shutting down etcd-Node ... 2026-03-13T12:38:59.885766426Z I0313 12:38:59.885749 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-13T12:38:59.885776456Z I0313 12:38:59.885764 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-13T12:38:59.885776456Z I0313 12:38:59.885771 1 controller_manager.go:54] RevisionController controller terminated 2026-03-13T12:38:59.885840498Z I0313 12:38:59.885822 1 envvarcontroller.go:252] Shutting down EnvVarController 2026-03-13T12:38:59.885871480Z I0313 12:38:59.885856 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-13T12:38:59.885947832Z I0313 12:38:59.885924 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-13T12:38:59.885974733Z I0313 12:38:59.885959 1 base_controller.go:123] Shutting down worker of etcd controller ... 2026-03-13T12:38:59.885983994Z I0313 12:38:59.885972 1 base_controller.go:113] All etcd workers have been terminated 2026-03-13T12:38:59.885992674Z I0313 12:38:59.885986 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-13T12:38:59.886032605Z I0313 12:38:59.886012 1 base_controller.go:123] Shutting down worker of etcd-Node controller ... 2026-03-13T12:38:59.886032605Z I0313 12:38:59.886028 1 base_controller.go:113] All etcd-Node workers have been terminated 2026-03-13T12:38:59.886042656Z I0313 12:38:59.886034 1 controller_manager.go:54] etcd-Node controller terminated 2026-03-13T12:38:59.886278824Z E0313 12:38:59.886247 1 base_controller.go:279] "Unhandled Error" err="ScriptController reconciliation failed: \"configmap/etcd-pod\": Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-scripts\": context canceled" 2026-03-13T12:38:59.886661369Z E0313 12:38:59.886625 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-13T12:38:59.886729081Z I0313 12:38:59.886699 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"71fa5c29-76e6-4cd2-bfe6-5bb3aebee8fd", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ScriptControllerErrorUpdatingStatus' client rate limiter Wait returned an error: context canceled 2026-03-13T12:38:59.886814244Z I0313 12:38:59.886789 1 base_controller.go:123] Shutting down worker of EtcdCertSignerController controller ... 2026-03-13T12:38:59.886814244Z I0313 12:38:59.886808 1 base_controller.go:113] All EtcdCertSignerController workers have been terminated 2026-03-13T12:38:59.886876596Z E0313 12:38:59.886844 1 base_controller.go:279] "Unhandled Error" err="etcd-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"etcd-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-13T12:38:59.886876596Z I0313 12:38:59.886868 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-13T12:38:59.886900847Z I0313 12:38:59.886872 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-13T12:38:59.886900847Z I0313 12:38:59.886875 1 base_controller.go:123] Shutting down worker of etcd-InstallerState controller ... 2026-03-13T12:38:59.886913098Z I0313 12:38:59.886907 1 base_controller.go:113] All etcd-InstallerState workers have been terminated 2026-03-13T12:38:59.886921968Z I0313 12:38:59.886915 1 controller_manager.go:54] etcd-InstallerState controller terminated 2026-03-13T12:38:59.886921968Z I0313 12:38:59.886916 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-13T12:38:59.886951729Z I0313 12:38:59.886928 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-13T12:38:59.886951729Z I0313 12:38:59.886940 1 controller_manager.go:54] GuardController controller terminated 2026-03-13T12:38:59.886992731Z I0313 12:38:59.886952 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T12:38:59.887006501Z I0313 12:38:59.886998 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T12:38:59.887015651Z I0313 12:38:59.886916 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-13T12:38:59.887026172Z I0313 12:38:59.887012 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-13T12:38:59.887026172Z I0313 12:38:59.887018 1 base_controller.go:113] All Installer workers have been terminated 2026-03-13T12:38:59.887035032Z I0313 12:38:59.887027 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-13T12:38:59.887035032Z I0313 12:38:59.887028 1 controller_manager.go:54] Installer controller terminated 2026-03-13T12:38:59.887043352Z I0313 12:38:59.887033 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-13T12:38:59.887206858Z I0313 12:38:59.887178 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T12:38:59.887279881Z I0313 12:38:59.887255 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T12:38:59.887335753Z I0313 12:38:59.887304 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-13T12:38:59.887347023Z I0313 12:38:59.887332 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-13T12:38:59.887355854Z I0313 12:38:59.887340 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T12:38:59.887399925Z I0313 12:38:59.887373 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T12:38:59.887430466Z I0313 12:38:59.887410 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-13T12:38:59.887440357Z I0313 12:38:59.887434 1 builder.go:335] server exited 2026-03-13T12:38:59.888873509Z I0313 12:38:59.887526 1 base_controller.go:123] Shutting down worker of ScriptController controller ... 2026-03-13T12:38:59.888873509Z I0313 12:38:59.887544 1 base_controller.go:113] All ScriptController workers have been terminated 2026-03-13T12:38:59.888873509Z E0313 12:38:59.887602 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-etcd-operator/leases/openshift-cluster-etcd-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-03-13T12:38:59.888873509Z E0313 12:38:59.887663 1 leaderelection.go:436] error retrieving resource lock openshift-etcd-operator/openshift-cluster-etcd-operator-lock: client rate limiter Wait returned an error: context canceled 2026-03-13T12:38:59.888873509Z I0313 12:38:59.887680 1 leaderelection.go:297] failed to renew lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock: timed out waiting for the condition 2026-03-13T12:38:59.888873509Z I0313 12:38:59.887873 1 base_controller.go:123] Shutting down worker of etcd-StaticPodState controller ... 2026-03-13T12:38:59.888873509Z I0313 12:38:59.887882 1 base_controller.go:113] All etcd-StaticPodState workers have been terminated 2026-03-13T12:38:59.888873509Z I0313 12:38:59.887887 1 controller_manager.go:54] etcd-StaticPodState controller terminated 2026-03-13T12:38:59.888873509Z I0313 12:38:59.887898 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-13T12:38:59.888873509Z I0313 12:38:59.887913 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-13T12:38:59.888873509Z E0313 12:38:59.887966 1 base_controller.go:279] "Unhandled Error" err="EtcdStaticResources-StaticResources reconciliation failed: [\"etcd/svc.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/services/etcd\": context canceled, \"etcd/sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/minimal-sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-cr.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"EtcdStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T12:38:59.888873509Z I0313 12:38:59.888105 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-2454087925/tls.crt::/tmp/serving-cert-2454087925/tls.key" 2026-03-13T12:38:59.889277493Z E0313 12:38:59.889168 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T12:38:59.889299475Z I0313 12:38:59.889279 1 base_controller.go:123] Shutting down worker of EtcdStaticResources-StaticResources controller ... 2026-03-13T12:38:59.889299475Z I0313 12:38:59.889294 1 base_controller.go:113] All EtcdStaticResources-StaticResources workers have been terminated 2026-03-13T12:38:59.890868792Z I0313 12:38:59.890392 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-13T12:38:59.890868792Z I0313 12:38:59.890432 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-13T12:38:59.890868792Z I0313 12:38:59.890446 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-13T12:39:04.427698744Z I0313 12:39:04.427523 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="d0850c2f5bf8a1805770406cea70ad50cf7e1fa60eff491bd4d8dc838ee3fd57") 2026-03-13T12:39:04.427698744Z I0313 12:39:04.427633 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.crt" changed 2026-03-13T12:39:04.427698744Z I0313 12:39:04.427688 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="bc96aa6c3fd151b1ec94fdff7bc4f88f6e3f9662eb5b52c7d9317225b523df0c") 2026-03-13T12:39:04.427698744Z I0313 12:39:04.427693 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.key" changed 2026-03-13T12:39:04.427761536Z I0313 12:39:04.427734 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.crt" has been modified (old="", new="2c422003122f7c567b2129455bf19ae76efb3d8c4810e5be2bcdac8422065257") 2026-03-13T12:39:04.427769376Z I0313 12:39:04.427762 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.crt" changed 2026-03-13T12:39:04.427826028Z I0313 12:39:04.427799 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.key" has been modified (old="", new="105f576d70bd49e21b72af2683868f4c6632969cad3976d34121c3bf99128469") 2026-03-13T12:39:04.427826028Z I0313 12:39:04.427809 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.key" changed 2026-03-13T12:39:04.427915751Z I0313 12:39:04.427866 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-ca/ca-bundle.crt" has been created (hash="f00ab8f1a12a0ff45cb120f1efd7605fcf737410b7cd899c3ccb650bd7854a89") 2026-03-13T12:39:04.427915751Z I0313 12:39:04.427876 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-ca/ca-bundle.crt" changed 2026-03-13T12:39:04.427929832Z I0313 12:39:04.427923 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-service-ca/service-ca.crt" has been created (hash="82fa30cb5f469aaf14f1f8dd3e5b1731aa47570928c3579036c9618902233add") 2026-03-13T12:39:04.427938832Z I0313 12:39:04.427930 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-service-ca/service-ca.crt" changed 2026-03-13T12:39:04.883037328Z I0313 12:39:04.882962 1 observer_polling.go:162] Shutting down file observer 2026-03-13T12:39:12.117546545Z W0313 12:39:12.117437 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-13T12:39:12.119894847Z E0313 12:39:12.119846 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberController reconciliation failed: could not get list of unhealthy members: giving up getting a cached client after 3 tries" 2026-03-13T12:39:12.121200106Z I0313 12:39:12.121125 1 base_controller.go:123] Shutting down worker of ClusterMemberController controller ... 2026-03-13T12:39:12.121251517Z I0313 12:39:12.121224 1 base_controller.go:113] All ClusterMemberController workers have been terminated 2026-03-13T12:39:12.899313376Z W0313 12:39:12.899197 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-13T12:39:12.899382987Z E0313 12:39:12.899305 1 base_controller.go:279] "Unhandled Error" err="BootstrapTeardownController reconciliation failed: error while canRemoveEtcdBootstrap: giving up getting a cached client after 3 tries" 2026-03-13T12:39:12.900629855Z I0313 12:39:12.900552 1 base_controller.go:123] Shutting down worker of BootstrapTeardownController controller ... 2026-03-13T12:39:12.900689656Z I0313 12:39:12.900624 1 base_controller.go:113] All BootstrapTeardownController workers have been terminated 2026-03-13T12:39:33.892747226Z E0313 12:39:33.892662 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{etcd-operator.189c66f14fa05185 openshift-etcd-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-etcd-operator,Name:etcd-operator,UID:71fa5c29-76e6-4cd2-bfe6-5bb3aebee8fd,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:ScriptControllerErrorUpdatingStatus,Message:client rate limiter Wait returned an error: context canceled,Source:EventSource{Component:openshift-cluster-etcd-operator-script-controller-scriptcontroller,Host:,},FirstTimestamp:2026-03-13 12:38:59.886190981 +0000 UTC m=+75.523563676,LastTimestamp:2026-03-13 12:38:59.886190981 +0000 UTC m=+75.523563676,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:openshift-cluster-etcd-operator-script-controller-scriptcontroller,ReportingInstance:,}" 2026-03-13T12:39:33.892812968Z E0313 12:39:33.892778 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T12:39:33.892983042Z W0313 12:39:33.892949 1 leaderelection.go:84] leader election lost config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-hjzms.json0000640000000000000000000001575615155003025024165 0ustar0000000000000000{"metadata":{"name":"etcd-operator-5884b9cd56-hjzms","generateName":"etcd-operator-5884b9cd56-","namespace":"openshift-etcd-operator","uid":"15b592d6-3c48-45d4-9172-d28632ae8995","resourceVersion":"9127","creationTimestamp":"2026-03-13T12:35:29Z","labels":{"app":"etcd-operator","pod-template-hash":"5884b9cd56"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.5/23\"],\"mac_address\":\"0a:58:0a:80:00:05\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.5/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.5\"\n ],\n \"mac\": \"0a:58:0a:80:00:05\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-5884b9cd56","uid":"bed4669d-ea14-458d-8377-c7a40b7396ff","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-clrz7","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-clrz7","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:26Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:20Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.5","podIPs":[{"ip":"10.128.0.5"}],"startTime":"2026-03-13T12:37:20Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-03-13T12:40:14Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T12:37:44Z","finishedAt":"2026-03-13T12:39:33Z","containerID":"cri-o://c3cc4d20a3385510f2813df129cea65d1b836444e4586b47995a2d6b48933eba"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","containerID":"cri-o://5d11669c933e022e2eb1221b72c8dfc83094667fb6b7c0cba300ddb5b306a9d7","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-clrz7","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000002746015155003025034174 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-844bc54c88-vznst2026-03-13T12:38:20.429429995Z W0313 12:38:20.428891 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-13T12:38:20.429540919Z I0313 12:38:20.429450 1 crypto.go:601] Generating new CA for check-endpoints-signer@1773405500 cert, and key in /tmp/serving-cert-2949102977/serving-signer.crt, /tmp/serving-cert-2949102977/serving-signer.key 2026-03-13T12:38:21.062372462Z I0313 12:38:21.061896 1 observer_polling.go:159] Starting file observer 2026-03-13T12:38:21.094174660Z I0313 12:38:21.094107 1 builder.go:304] check-endpoints version 4.18.0-202602132343.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-13T12:38:21.094943898Z I0313 12:38:21.094913 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-2949102977/tls.crt::/tmp/serving-cert-2949102977/tls.key" 2026-03-13T12:38:21.454791825Z I0313 12:38:21.454758 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-13T12:38:21.456439726Z I0313 12:38:21.456418 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-13T12:38:21.456478328Z I0313 12:38:21.456468 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-13T12:38:21.456535260Z I0313 12:38:21.456507 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-13T12:38:21.456569701Z I0313 12:38:21.456558 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-13T12:38:21.461367065Z I0313 12:38:21.461339 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T12:38:21.461367065Z I0313 12:38:21.461353 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-13T12:38:21.461386056Z W0313 12:38:21.461370 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T12:38:21.461386056Z W0313 12:38:21.461379 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T12:38:21.461394046Z W0313 12:38:21.461385 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T12:38:21.461394046Z W0313 12:38:21.461390 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T12:38:21.461401566Z W0313 12:38:21.461394 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T12:38:21.461401566Z W0313 12:38:21.461399 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T12:38:21.465521966Z I0313 12:38:21.465475 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T12:38:21.465521966Z I0313 12:38:21.465471 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T12:38:21.465521966Z I0313 12:38:21.465507 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T12:38:21.466381488Z I0313 12:38:21.466356 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T12:38:21.466399669Z I0313 12:38:21.466362 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T12:38:21.466460761Z I0313 12:38:21.466436 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T12:38:21.466480721Z I0313 12:38:21.466459 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T12:38:21.466729410Z I0313 12:38:21.466482 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T12:38:21.467407015Z I0313 12:38:21.467374 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-2949102977/tls.crt::/tmp/serving-cert-2949102977/tls.key" 2026-03-13T12:38:21.467513628Z I0313 12:38:21.467495 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2949102977/tls.crt::/tmp/serving-cert-2949102977/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773405500\" (2026-03-13 12:38:20 +0000 UTC to 2026-04-12 12:38:21 +0000 UTC (now=2026-03-13 12:38:21.467452946 +0000 UTC))" 2026-03-13T12:38:21.467679275Z I0313 12:38:21.467663 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773405501\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773405501\" (2026-03-13 11:38:21 +0000 UTC to 2027-03-13 11:38:21 +0000 UTC (now=2026-03-13 12:38:21.467637414 +0000 UTC))" 2026-03-13T12:38:21.467705436Z I0313 12:38:21.467690 1 secure_serving.go:213] Serving securely on [::]:17698 2026-03-13T12:38:21.467731197Z I0313 12:38:21.467717 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-13T12:38:21.467765558Z I0313 12:38:21.467751 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T12:38:21.470489267Z I0313 12:38:21.470466 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T12:38:21.470764647Z I0313 12:38:21.470736 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-03-13T12:38:21.470925843Z I0313 12:38:21.470897 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T12:38:21.471017936Z I0313 12:38:21.470995 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T12:38:21.566498291Z I0313 12:38:21.566438 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T12:38:21.566612625Z I0313 12:38:21.566569 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T12:38:21.566799182Z I0313 12:38:21.566756 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-13 12:26:38 +0000 UTC to 2026-03-14 12:26:38 +0000 UTC (now=2026-03-13 12:38:21.56672603 +0000 UTC))" 2026-03-13T12:38:21.567218758Z I0313 12:38:21.567191 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2949102977/tls.crt::/tmp/serving-cert-2949102977/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773405500\" (2026-03-13 12:38:20 +0000 UTC to 2026-04-12 12:38:21 +0000 UTC (now=2026-03-13 12:38:21.567167176 +0000 UTC))" 2026-03-13T12:38:21.567337672Z I0313 12:38:21.567320 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T12:38:21.567449476Z I0313 12:38:21.567338 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773405501\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773405501\" (2026-03-13 11:38:21 +0000 UTC to 2027-03-13 11:38:21 +0000 UTC (now=2026-03-13 12:38:21.567317932 +0000 UTC))" 2026-03-13T12:38:21.567573911Z I0313 12:38:21.567558 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 12:19:46 +0000 UTC to 2036-03-10 12:19:46 +0000 UTC (now=2026-03-13 12:38:21.56754076 +0000 UTC))" 2026-03-13T12:38:21.567613022Z I0313 12:38:21.567603 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-13 12:26:40 +0000 UTC to 2026-03-14 12:26:40 +0000 UTC (now=2026-03-13 12:38:21.567590401 +0000 UTC))" 2026-03-13T12:38:21.567652824Z I0313 12:38:21.567637 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-13 12:26:40 +0000 UTC to 2027-03-13 12:26:40 +0000 UTC (now=2026-03-13 12:38:21.567626513 +0000 UTC))" 2026-03-13T12:38:21.567686025Z I0313 12:38:21.567677 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-13 12:26:41 +0000 UTC to 2027-03-13 12:26:41 +0000 UTC (now=2026-03-13 12:38:21.567667244 +0000 UTC))" 2026-03-13T12:38:21.567717826Z I0313 12:38:21.567709 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 12:26:38 +0000 UTC to 2036-03-10 12:26:38 +0000 UTC (now=2026-03-13 12:38:21.567699885 +0000 UTC))" 2026-03-13T12:38:21.567774638Z I0313 12:38:21.567758 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-13 12:26:38 +0000 UTC to 2026-03-14 12:26:38 +0000 UTC (now=2026-03-13 12:38:21.567739967 +0000 UTC))" 2026-03-13T12:38:21.567979955Z I0313 12:38:21.567955 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2949102977/tls.crt::/tmp/serving-cert-2949102977/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773405500\" (2026-03-13 12:38:20 +0000 UTC to 2026-04-12 12:38:21 +0000 UTC (now=2026-03-13 12:38:21.567937194 +0000 UTC))" 2026-03-13T12:38:21.568211023Z I0313 12:38:21.568182 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773405501\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773405501\" (2026-03-13 11:38:21 +0000 UTC to 2027-03-13 11:38:21 +0000 UTC (now=2026-03-13 12:38:21.568161272 +0000 UTC))" 2026-03-13T12:38:21.793373059Z I0313 12:38:21.793308 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T12:38:21.871709200Z I0313 12:38:21.871600 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-03-13T12:38:21.871709200Z I0313 12:38:21.871635 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-844bc54c88-vznst/openshift-apiserver_current.log0000640000000000000000000011502215155003025031167 0ustar00000000000000002026-03-13T12:41:18.071710468Z E0313 12:41:18.071235 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:18.456295787Z E0313 12:41:18.455299 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:18.456295787Z E0313 12:41:18.455615 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:18.456295787Z E0313 12:41:18.455795 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:18.456295787Z E0313 12:41:18.455957 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:18.456295787Z E0313 12:41:18.456113 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.579354158Z E0313 12:41:28.579285 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.579429840Z E0313 12:41:28.579374 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.579542424Z E0313 12:41:28.579511 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.579815081Z E0313 12:41:28.579551 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.579815081Z E0313 12:41:28.579587 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.663899758Z E0313 12:41:28.663782 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.664079953Z E0313 12:41:28.664021 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.664931264Z E0313 12:41:28.664365 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.664931264Z E0313 12:41:28.664470 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.664931264Z E0313 12:41:28.664774 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.681338601Z E0313 12:41:28.681271 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.681842774Z E0313 12:41:28.681792 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.682058719Z E0313 12:41:28.682025 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.682447889Z E0313 12:41:28.682400 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.682474069Z E0313 12:41:28.682463 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.955055698Z E0313 12:41:28.953490 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.955055698Z E0313 12:41:28.953806 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.955055698Z E0313 12:41:28.953952 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.955055698Z E0313 12:41:28.954114 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:28.955055698Z E0313 12:41:28.954303 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.841412612Z E0313 12:41:37.840606 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.841412612Z E0313 12:41:37.840687 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.841412612Z E0313 12:41:37.840887 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.841412612Z E0313 12:41:37.841022 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.841412612Z E0313 12:41:37.841112 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.841412612Z E0313 12:41:37.841216 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.841412612Z E0313 12:41:37.841377 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.841606007Z E0313 12:41:37.841405 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.841606007Z E0313 12:41:37.841563 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.841617618Z E0313 12:41:37.841607 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.843406023Z E0313 12:41:37.841759 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.843406023Z E0313 12:41:37.841823 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.843406023Z E0313 12:41:37.841962 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.843406023Z E0313 12:41:37.842165 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.843406023Z E0313 12:41:37.840606 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.844890930Z E0313 12:41:37.844421 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.844890930Z E0313 12:41:37.844877 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.845727202Z E0313 12:41:37.845077 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.845727202Z E0313 12:41:37.845340 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.845727202Z E0313 12:41:37.845356 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.845727202Z E0313 12:41:37.845562 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.845727202Z E0313 12:41:37.845605 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.845793583Z E0313 12:41:37.845766 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.846585093Z E0313 12:41:37.845859 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.846585093Z E0313 12:41:37.845930 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.857161151Z E0313 12:41:37.857079 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.857215733Z E0313 12:41:37.857191 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.857408148Z E0313 12:41:37.857373 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.857465529Z E0313 12:41:37.857378 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.857567922Z E0313 12:41:37.857540 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.857567922Z E0313 12:41:37.857549 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.857749236Z E0313 12:41:37.857723 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.857815208Z E0313 12:41:37.857791 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.857870069Z E0313 12:41:37.857466 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.857913480Z E0313 12:41:37.857888 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.858014403Z E0313 12:41:37.857969 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.858030523Z E0313 12:41:37.857082 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.858166646Z E0313 12:41:37.857724 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.858190897Z E0313 12:41:37.858181 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.858752492Z E0313 12:41:37.858696 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.862923317Z E0313 12:41:37.862852 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.863539043Z E0313 12:41:37.863503 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.863922483Z E0313 12:41:37.863890 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.869238807Z E0313 12:41:37.869078 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.869870893Z E0313 12:41:37.869817 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:46.639203682Z I0313 12:41:46.590268 1 policy_source.go:224] refreshing policies 2026-03-13T12:41:46.664764410Z I0313 12:41:46.664684 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-13T12:41:46.671056780Z I0313 12:41:46.670996 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T12:41:47.470733003Z E0313 12:41:47.470504 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:47.470973059Z E0313 12:41:47.470955 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:47.471237615Z E0313 12:41:47.471221 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:47.471510802Z E0313 12:41:47.471489 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:47.471780810Z E0313 12:41:47.471736 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:47.471947904Z E0313 12:41:47.471930 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:47.472035056Z E0313 12:41:47.472014 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:47.472103468Z E0313 12:41:47.471955 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:47.472188030Z E0313 12:41:47.472116 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:47.472188030Z E0313 12:41:47.472159 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:47.804653404Z E0313 12:41:47.622979 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:47.804653404Z E0313 12:41:47.623539 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:47.804653404Z E0313 12:41:47.623799 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:47.804653404Z E0313 12:41:47.636192 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:47.804653404Z E0313 12:41:47.636935 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:47.804653404Z I0313 12:41:47.802654 1 policy_source.go:224] refreshing policies 2026-03-13T12:41:48.092534779Z E0313 12:41:48.086306 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:48.092534779Z E0313 12:41:48.086374 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:48.092534779Z E0313 12:41:48.086421 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:48.092534779Z E0313 12:41:48.086674 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:48.092534779Z E0313 12:41:48.086738 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:48.464862644Z E0313 12:41:48.464804 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:48.472868027Z E0313 12:41:48.472816 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:48.472868027Z E0313 12:41:48.472830 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:48.473092013Z E0313 12:41:48.473070 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:48.475742600Z E0313 12:41:48.475711 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000005552415155003025040451 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-799b6db4d7-xchrj2026-03-13T12:40:59.133202716Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/route.openshift.io/v1: 401 2026-03-13T12:40:59.133202716Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/security.openshift.io/v1: 401 2026-03-13T12:40:59.133202716Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/template.openshift.io/v1: 401 2026-03-13T12:40:59.133202716Z > 2026-03-13T12:41:01.269067247Z E0313 12:41:01.268975 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-13T12:41:01.269067247Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/apps.openshift.io/v1: 401 2026-03-13T12:41:01.269067247Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: 401 2026-03-13T12:41:01.269067247Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/build.openshift.io/v1: 401 2026-03-13T12:41:01.269067247Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/image.openshift.io/v1: 401 2026-03-13T12:41:01.269067247Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/project.openshift.io/v1: 401 2026-03-13T12:41:01.269067247Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/quota.openshift.io/v1: 401 2026-03-13T12:41:01.269067247Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/route.openshift.io/v1: 401 2026-03-13T12:41:01.269067247Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/security.openshift.io/v1: 401 2026-03-13T12:41:01.269067247Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/template.openshift.io/v1: 401 2026-03-13T12:41:01.269067247Z > 2026-03-13T12:41:09.293725614Z E0313 12:41:09.293614 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-13T12:41:09.293725614Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/apps.openshift.io/v1: 401 2026-03-13T12:41:09.293725614Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: 401 2026-03-13T12:41:09.293725614Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/build.openshift.io/v1: 401 2026-03-13T12:41:09.293725614Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/image.openshift.io/v1: 401 2026-03-13T12:41:09.293725614Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/project.openshift.io/v1: 401 2026-03-13T12:41:09.293725614Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/quota.openshift.io/v1: 401 2026-03-13T12:41:09.293725614Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/route.openshift.io/v1: 401 2026-03-13T12:41:09.293725614Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/security.openshift.io/v1: 401 2026-03-13T12:41:09.293725614Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/template.openshift.io/v1: 401 2026-03-13T12:41:09.293725614Z > 2026-03-13T12:41:12.889911310Z I0313 12:41:12.888561 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T12:41:13.404252622Z E0313 12:41:13.402898 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-13T12:41:13.404252622Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/apps.openshift.io/v1: 401 2026-03-13T12:41:13.404252622Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: 401 2026-03-13T12:41:13.404252622Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/build.openshift.io/v1: 401 2026-03-13T12:41:13.404252622Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/image.openshift.io/v1: 401 2026-03-13T12:41:13.404252622Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/project.openshift.io/v1: 401 2026-03-13T12:41:13.404252622Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/quota.openshift.io/v1: 401 2026-03-13T12:41:13.404252622Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/route.openshift.io/v1: 401 2026-03-13T12:41:13.404252622Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/security.openshift.io/v1: 401 2026-03-13T12:41:13.404252622Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/template.openshift.io/v1: 401 2026-03-13T12:41:13.404252622Z > 2026-03-13T12:41:19.294432849Z E0313 12:41:19.294367 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-13T12:41:19.294432849Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/apps.openshift.io/v1: 401 2026-03-13T12:41:19.294432849Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: 401 2026-03-13T12:41:19.294432849Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/build.openshift.io/v1: 401 2026-03-13T12:41:19.294432849Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/image.openshift.io/v1: 401 2026-03-13T12:41:19.294432849Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/project.openshift.io/v1: 401 2026-03-13T12:41:19.294432849Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/quota.openshift.io/v1: 401 2026-03-13T12:41:19.294432849Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/route.openshift.io/v1: 401 2026-03-13T12:41:19.294432849Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/security.openshift.io/v1: 401 2026-03-13T12:41:19.294432849Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/template.openshift.io/v1: 401 2026-03-13T12:41:19.294432849Z > 2026-03-13T12:41:26.020600173Z I0313 12:41:26.020510 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T12:41:29.351983113Z E0313 12:41:29.351924 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-13T12:41:29.351983113Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/apps.openshift.io/v1: 401 2026-03-13T12:41:29.351983113Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: 401 2026-03-13T12:41:29.351983113Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/build.openshift.io/v1: 401 2026-03-13T12:41:29.351983113Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/image.openshift.io/v1: 401 2026-03-13T12:41:29.351983113Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/project.openshift.io/v1: 401 2026-03-13T12:41:29.351983113Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/quota.openshift.io/v1: 401 2026-03-13T12:41:29.351983113Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/route.openshift.io/v1: 401 2026-03-13T12:41:29.351983113Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/security.openshift.io/v1: 401 2026-03-13T12:41:29.351983113Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/template.openshift.io/v1: 401 2026-03-13T12:41:29.351983113Z > 2026-03-13T12:41:30.282168671Z I0313 12:41:30.282081 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T12:41:32.105677419Z E0313 12:41:32.035081 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-13T12:41:32.105677419Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/apps.openshift.io/v1: 401 2026-03-13T12:41:32.105677419Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: 401 2026-03-13T12:41:32.105677419Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/build.openshift.io/v1: 401 2026-03-13T12:41:32.105677419Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/image.openshift.io/v1: 401 2026-03-13T12:41:32.105677419Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/project.openshift.io/v1: 401 2026-03-13T12:41:32.105677419Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/quota.openshift.io/v1: 401 2026-03-13T12:41:32.105677419Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/route.openshift.io/v1: 401 2026-03-13T12:41:32.105677419Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/security.openshift.io/v1: 401 2026-03-13T12:41:32.105677419Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/template.openshift.io/v1: 401 2026-03-13T12:41:32.105677419Z > 2026-03-13T12:41:46.275198959Z E0313 12:41:46.275101 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-13T12:41:46.275198959Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/apps.openshift.io/v1: 401 2026-03-13T12:41:46.275198959Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: 401 2026-03-13T12:41:46.275198959Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/build.openshift.io/v1: 401 2026-03-13T12:41:46.275198959Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/image.openshift.io/v1: 401 2026-03-13T12:41:46.275198959Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/project.openshift.io/v1: 401 2026-03-13T12:41:46.275198959Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/quota.openshift.io/v1: 401 2026-03-13T12:41:46.275198959Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/route.openshift.io/v1: 401 2026-03-13T12:41:46.275198959Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/security.openshift.io/v1: 401 2026-03-13T12:41:46.275198959Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/template.openshift.io/v1: 401 2026-03-13T12:41:46.275198959Z > 2026-03-13T12:41:48.818226478Z I0313 12:41:48.814585 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T12:41:49.767748148Z E0313 12:41:49.764006 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-13T12:41:49.767748148Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/apps.openshift.io/v1: 401 2026-03-13T12:41:49.767748148Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: 401 2026-03-13T12:41:49.767748148Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/build.openshift.io/v1: 401 2026-03-13T12:41:49.767748148Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/image.openshift.io/v1: 401 2026-03-13T12:41:49.767748148Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/project.openshift.io/v1: 401 2026-03-13T12:41:49.767748148Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/quota.openshift.io/v1: 401 2026-03-13T12:41:49.767748148Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/route.openshift.io/v1: 401 2026-03-13T12:41:49.767748148Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/security.openshift.io/v1: 401 2026-03-13T12:41:49.767748148Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/template.openshift.io/v1: 401 2026-03-13T12:41:49.767748148Z > 2026-03-13T12:41:50.867870575Z I0313 12:41:50.867796 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T12:41:50.986869991Z I0313 12:41:50.985482 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T12:41:51.125129055Z I0313 12:41:51.125070 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T12:41:52.092024335Z I0313 12:41:52.091957 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. openshift-apiserver-operator_previous.log0000640000000000000000000004431715155003025040641 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-799b6db4d7-xchrj2026-03-13T12:38:33.207118262Z E0313 12:38:33.207017 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-13T12:38:33.207118262Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/apps.openshift.io/v1: 401 2026-03-13T12:38:33.207118262Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: 401 2026-03-13T12:38:33.207118262Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/build.openshift.io/v1: 401 2026-03-13T12:38:33.207118262Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/image.openshift.io/v1: 401 2026-03-13T12:38:33.207118262Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/project.openshift.io/v1: 401 2026-03-13T12:38:33.207118262Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/quota.openshift.io/v1: 401 2026-03-13T12:38:33.207118262Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/route.openshift.io/v1: 401 2026-03-13T12:38:33.207118262Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/security.openshift.io/v1: 401 2026-03-13T12:38:33.207118262Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/template.openshift.io/v1: 401 2026-03-13T12:38:33.207118262Z > 2026-03-13T12:38:33.616438430Z I0313 12:38:33.615879 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T12:38:33.665184865Z I0313 12:38:33.664656 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T12:39:18.144782649Z E0313 12:39:18.144487 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-13T12:39:45.373010343Z E0313 12:39:45.372920 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-apiserver reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-apiserver)" 2026-03-13T12:40:08.278861963Z E0313 12:40:08.278609 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-AuditPolicy\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-03-13T12:40:13.738036513Z I0313 12:40:13.737942 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="e7328ae2f4e7ac5aea1689f93a714108ae8ea604fd2006c3b71d76cd8ed2f177") 2026-03-13T12:40:13.738216367Z W0313 12:40:13.738141 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.key was created 2026-03-13T12:40:13.738405412Z I0313 12:40:13.738361 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-13T12:40:13.738474834Z I0313 12:40:13.738425 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-13T12:40:13.738522745Z I0313 12:40:13.738491 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="6fb29872003f396be8ec9c0e2b3212a1d751e2eac22924f16b9efbe575845005") 2026-03-13T12:40:13.738575096Z I0313 12:40:13.738551 1 base_controller.go:181] Shutting down APIServerStaticResources-StaticResources ... 2026-03-13T12:40:13.738575096Z I0313 12:40:13.738551 1 base_controller.go:181] Shutting down openshift-apiserver-RemoveStaleConditions ... 2026-03-13T12:40:13.738634647Z I0313 12:40:13.738596 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-13T12:40:13.738655178Z I0313 12:40:13.738618 1 base_controller.go:181] Shutting down StatusSyncer_openshift-apiserver ... 2026-03-13T12:40:13.738664098Z I0313 12:40:13.738656 1 base_controller.go:123] Shutting down worker of StatusSyncer_openshift-apiserver controller ... 2026-03-13T12:40:13.738732349Z I0313 12:40:13.738701 1 base_controller.go:181] Shutting down openshift-apiserver-UnsupportedConfigOverrides ... 2026-03-13T12:40:13.738741770Z I0313 12:40:13.738735 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-13T12:40:13.738760550Z E0313 12:40:13.738711 1 leaderelection.go:436] error retrieving resource lock openshift-apiserver-operator/openshift-apiserver-operator-lock: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock?timeout=4m0s": context canceled 2026-03-13T12:40:13.738771020Z I0313 12:40:13.738752 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-13T12:40:13.738779201Z I0313 12:40:13.738772 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-13T12:40:13.738859952Z I0313 12:40:13.738804 1 leaderelection.go:297] failed to renew lease openshift-apiserver-operator/openshift-apiserver-operator-lock: timed out waiting for the condition 2026-03-13T12:40:13.738959574Z I0313 12:40:13.738889 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-13T12:40:13.739035546Z I0313 12:40:13.739009 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-13T12:40:13.739088197Z I0313 12:40:13.739072 1 base_controller.go:159] All StatusSyncer_openshift-apiserver post start hooks have been terminated 2026-03-13T12:40:13.739088197Z I0313 12:40:13.739080 1 base_controller.go:113] All StatusSyncer_openshift-apiserver workers have been terminated 2026-03-13T12:40:13.739113098Z I0313 12:40:13.739095 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2026-03-13T12:40:13.739179669Z I0313 12:40:13.739143 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-13T12:40:13.739275751Z I0313 12:40:13.739246 1 base_controller.go:181] Shutting down ConnectivityCheckController ... 2026-03-13T12:40:13.739307192Z I0313 12:40:13.739285 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionKey ... 2026-03-13T12:40:13.739318642Z I0313 12:40:13.739310 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionMigration ... 2026-03-13T12:40:13.739329873Z I0313 12:40:13.739321 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-13T12:40:13.739338633Z I0313 12:40:13.739326 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionState ... 2026-03-13T12:40:13.739351443Z I0313 12:40:13.739342 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionPrune ... 2026-03-13T12:40:13.739360693Z I0313 12:40:13.739345 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T12:40:13.739394254Z I0313 12:40:13.739372 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionCondition ... 2026-03-13T12:40:13.739394254Z I0313 12:40:13.739375 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T12:40:13.739448915Z E0313 12:40:13.739423 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the operator is shutting down, skipping updating conditions, err = failed to reconcile enabled APIs: [the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.build.openshift.io), Get \"https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices/v1.image.openshift.io\": context canceled, client rate limiter Wait returned an error: context canceled]" 2026-03-13T12:40:13.739464305Z I0313 12:40:13.739457 1 base_controller.go:181] Shutting down OpenShiftAPIServer-WorkloadWorkloadController ... 2026-03-13T12:40:13.739475266Z I0313 12:40:13.739466 1 base_controller.go:181] Shutting down openshift-apiserver ... 2026-03-13T12:40:13.739506986Z I0313 12:40:13.738746 1 base_controller.go:123] Shutting down worker of openshift-apiserver-UnsupportedConfigOverrides controller ... 2026-03-13T12:40:13.739544347Z I0313 12:40:13.739523 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-13T12:40:13.739544347Z I0313 12:40:13.739529 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T12:40:13.739555147Z I0313 12:40:13.739540 1 base_controller.go:113] All openshift-apiserver-UnsupportedConfigOverrides workers have been terminated 2026-03-13T12:40:13.739555147Z I0313 12:40:13.739543 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-13T12:40:13.739581238Z I0313 12:40:13.739563 1 builder.go:335] server exited 2026-03-13T12:40:13.739581238Z I0313 12:40:13.739568 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-392943101/tls.crt::/tmp/serving-cert-392943101/tls.key" 2026-03-13T12:40:13.739628049Z I0313 12:40:13.739601 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionKey controller ... 2026-03-13T12:40:13.739638349Z I0313 12:40:13.739629 1 base_controller.go:113] All openshift-apiserver-EncryptionKey workers have been terminated 2026-03-13T12:40:13.739656480Z I0313 12:40:13.739569 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2026-03-13T12:40:13.739656480Z I0313 12:40:13.739650 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionMigration controller ... 2026-03-13T12:40:13.739665381Z I0313 12:40:13.739660 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2026-03-13T12:40:13.739673911Z I0313 12:40:13.739664 1 base_controller.go:113] All openshift-apiserver-EncryptionMigration workers have been terminated 2026-03-13T12:40:13.739714892Z I0313 12:40:13.739680 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionState controller ... 2026-03-13T12:40:13.739714892Z I0313 12:40:13.739699 1 base_controller.go:113] All openshift-apiserver-EncryptionState workers have been terminated 2026-03-13T12:40:13.739714892Z I0313 12:40:13.739700 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T12:40:13.739726452Z I0313 12:40:13.739715 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-13T12:40:13.739742732Z I0313 12:40:13.739727 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionPrune controller ... 2026-03-13T12:40:13.739751563Z I0313 12:40:13.739742 1 base_controller.go:113] All openshift-apiserver-EncryptionPrune workers have been terminated 2026-03-13T12:40:13.739785603Z I0313 12:40:13.739757 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionCondition controller ... 2026-03-13T12:40:13.739785603Z I0313 12:40:13.739773 1 base_controller.go:181] Shutting down SecretRevisionPruneController ... 2026-03-13T12:40:13.739785603Z I0313 12:40:13.739777 1 base_controller.go:113] All openshift-apiserver-EncryptionCondition workers have been terminated 2026-03-13T12:40:13.739802014Z I0313 12:40:13.739780 1 base_controller.go:123] Shutting down worker of openshift-apiserver controller ... 2026-03-13T12:40:13.739802014Z I0313 12:40:13.739791 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-13T12:40:13.739811534Z I0313 12:40:13.739798 1 base_controller.go:113] All openshift-apiserver workers have been terminated 2026-03-13T12:40:13.739820994Z I0313 12:40:13.739802 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-13T12:40:13.739820994Z I0313 12:40:13.739807 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-03-13T12:40:13.739830164Z I0313 12:40:13.738608 1 base_controller.go:123] Shutting down worker of openshift-apiserver-RemoveStaleConditions controller ... 2026-03-13T12:40:13.739838665Z I0313 12:40:13.739827 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T12:40:13.739847335Z I0313 12:40:13.739841 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T12:40:13.739856005Z I0313 12:40:13.739845 1 base_controller.go:113] All openshift-apiserver-RemoveStaleConditions workers have been terminated 2026-03-13T12:40:13.739856005Z I0313 12:40:13.739758 1 base_controller.go:181] Shutting down NamespaceFinalizerController_openshift-apiserver ... 2026-03-13T12:40:13.739864815Z I0313 12:40:13.739820 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-03-13T12:40:13.739864815Z E0313 12:40:13.739858 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-apiserver reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-apiserver\": context canceled" 2026-03-13T12:40:13.741272947Z I0313 12:40:13.741233 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-apiserver controller ... 2026-03-13T12:40:13.741272947Z I0313 12:40:13.741249 1 base_controller.go:113] All NamespaceFinalizerController_openshift-apiserver workers have been terminated 2026-03-13T12:40:13.741293567Z I0313 12:40:13.741277 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-03-13T12:40:13.741293567Z I0313 12:40:13.741283 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-03-13T12:40:13.741590844Z E0313 12:40:13.741552 1 base_controller.go:279] "Unhandled Error" err="OpenShiftAPIServer-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OpenShiftAPIServer-Workload\": client rate limiter Wait returned an error: context canceled" 2026-03-13T12:40:13.741590844Z E0313 12:40:13.741566 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-13T12:40:13.741666855Z E0313 12:40:13.741625 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"v3.11.0/openshift-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-apiserver), \"v3.11.0/openshift-apiserver/apiserver-clusterrolebinding.yaml\" (string): Get \"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:openshift-apiserver\": context canceled, \"v3.11.0/openshift-apiserver/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/pdb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T12:40:13.741775258Z I0313 12:40:13.738555 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-13T12:40:13.742868673Z I0313 12:40:13.742837 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-13T12:40:13.742868673Z I0313 12:40:13.742852 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-13T12:40:13.743037276Z I0313 12:40:13.743005 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-03-13T12:40:13.743037276Z I0313 12:40:13.743015 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-03-13T12:40:13.743076337Z I0313 12:40:13.743053 1 base_controller.go:123] Shutting down worker of OpenShiftAPIServer-WorkloadWorkloadController controller ... 2026-03-13T12:40:13.743076337Z I0313 12:40:13.743071 1 base_controller.go:113] All OpenShiftAPIServer-WorkloadWorkloadController workers have been terminated 2026-03-13T12:40:18.737426805Z I0313 12:40:18.737302 1 observer_polling.go:162] Shutting down file observer 2026-03-13T12:40:19.134560214Z W0313 12:40:19.134487 1 leaderelection.go:84] leader election lost config/pod/openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-xchrj.json0000640000000000000000000001443615155003025030361 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-799b6db4d7-xchrj","generateName":"openshift-apiserver-operator-799b6db4d7-","namespace":"openshift-apiserver-operator","uid":"089cfabc-9d3d-4260-bb16-8b5eaf73b3fa","resourceVersion":"9160","creationTimestamp":"2026-03-13T12:35:30Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"799b6db4d7"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.13/23\"],\"mac_address\":\"0a:58:0a:80:00:0d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.13/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.13\"\n ],\n \"mac\": \"0a:58:0a:80:00:0d\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-799b6db4d7","uid":"0cba89cb-db9a-4134-9c8a-8497bcb9d0a1","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-vg8tz","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-vg8tz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c5"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:26Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.13","podIPs":[{"ip":"10.128.0.13"}],"startTime":"2026-03-13T12:37:21Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-03-13T12:40:27Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T12:37:43Z","finishedAt":"2026-03-13T12:40:19Z","containerID":"cri-o://814a1adb650838a7837cee0a591e9eba8984a73367ffe7b1b579ae47de6fda2a"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","containerID":"cri-o://13abf0479b13298ab465c691e26a5f91f167723c1dfd38a5ddfba43b7407cce4","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-vg8tz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000001021515155003025043035 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-5c74bfc494-m8mqj2026-03-13T12:40:14.314074299Z I0313 12:40:14.313905 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T12:40:14.314074299Z I0313 12:40:14.314040 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T12:40:14.314597840Z I0313 12:40:14.314551 1 observer_polling.go:159] Starting file observer 2026-03-13T12:40:27.156389471Z I0313 12:40:27.156305 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202602132343.p2.gc7b5163.assembly.stream.el9-c7b5163-c7b51633b67e3e2860ca053930422f69e17bd40a 2026-03-13T12:40:27.644054686Z I0313 12:40:27.643679 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T12:40:27.644054686Z W0313 12:40:27.643701 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T12:40:27.644054686Z W0313 12:40:27.643705 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T12:40:27.644054686Z W0313 12:40:27.643709 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T12:40:27.644054686Z W0313 12:40:27.643712 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T12:40:27.644054686Z W0313 12:40:27.643715 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T12:40:27.644054686Z W0313 12:40:27.643718 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T12:40:27.649484138Z I0313 12:40:27.648994 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T12:40:27.649484138Z I0313 12:40:27.649072 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T12:40:27.649484138Z I0313 12:40:27.649086 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T12:40:27.649484138Z I0313 12:40:27.649162 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T12:40:27.649520670Z I0313 12:40:27.649496 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T12:40:27.649938211Z I0313 12:40:27.649650 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T12:40:27.649938211Z I0313 12:40:27.649657 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T12:40:27.649938211Z I0313 12:40:27.649668 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T12:40:27.649938211Z I0313 12:40:27.649673 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T12:40:27.651245616Z I0313 12:40:27.651123 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T12:40:27.651654347Z I0313 12:40:27.651368 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... 2026-03-13T12:40:27.750396076Z I0313 12:40:27.750227 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T12:40:27.750396076Z I0313 12:40:27.750288 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T12:40:27.750481850Z I0313 12:40:27.750399 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-scheduler-operator-container_previous.log0000640000000000000000000004074315155003025043240 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-5c74bfc494-m8mqj2026-03-13T12:38:31.899982065Z I0313 12:38:31.899869 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"646f65a7-26c8-4cfb-85e0-6f6740e67392", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RevisionTriggered' new revision 4 triggered by "required configmap/serviceaccount-ca has changed" 2026-03-13T12:38:31.904182888Z I0313 12:38:31.900607 1 prune_controller.go:277] Nothing to prune 2026-03-13T12:38:31.934193761Z I0313 12:38:31.933728 1 prune_controller.go:277] Nothing to prune 2026-03-13T12:38:32.847339457Z I0313 12:38:32.847255 1 request.go:700] Waited for 1.382909875s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller 2026-03-13T12:38:33.422373305Z I0313 12:38:33.421774 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-03-13T12:38:42.990790324Z I0313 12:38:42.990693 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="c8039d277702299fce009a5182391cdd420ad3612b6f4d17964d385ee9777b76") 2026-03-13T12:38:42.990839407Z W0313 12:38:42.990826 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.key was created 2026-03-13T12:38:42.991191060Z I0313 12:38:42.991094 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-13T12:38:42.991234081Z I0313 12:38:42.991200 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-13T12:38:42.991276763Z I0313 12:38:42.991251 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-13T12:38:42.991298484Z I0313 12:38:42.991271 1 base_controller.go:181] Shutting down kube-scheduler-StaticPodState ... 2026-03-13T12:38:42.991318864Z I0313 12:38:42.991290 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="f1b552b5bbba435d9cf6f834350de237395b42ec194de3886dbfd5c3dfba35b4") 2026-03-13T12:38:42.991343635Z I0313 12:38:42.991321 1 base_controller.go:181] Shutting down cluster-kube-scheduler-operator-UnsupportedConfigOverrides ... 2026-03-13T12:38:42.991363736Z I0313 12:38:42.991339 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-13T12:38:42.991363736Z I0313 12:38:42.991346 1 base_controller.go:181] Shutting down GuardController ... 2026-03-13T12:38:42.991404087Z I0313 12:38:42.991366 1 base_controller.go:181] Shutting down kube-scheduler-Node ... 2026-03-13T12:38:42.991404087Z I0313 12:38:42.991383 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-13T12:38:42.991404087Z I0313 12:38:42.991398 1 base_controller.go:181] Shutting down kube-scheduler-InstallerState ... 2026-03-13T12:38:42.991429028Z I0313 12:38:42.991397 1 base_controller.go:123] Shutting down worker of cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller ... 2026-03-13T12:38:42.991429028Z I0313 12:38:42.991421 1 base_controller.go:113] All cluster-kube-scheduler-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-13T12:38:42.991449939Z I0313 12:38:42.991402 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-13T12:38:42.991668427Z I0313 12:38:42.991578 1 base_controller.go:181] Shutting down kube-scheduler ... 2026-03-13T12:38:42.991668427Z I0313 12:38:42.991584 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-13T12:38:42.991668427Z I0313 12:38:42.991600 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-13T12:38:42.991668427Z I0313 12:38:42.991623 1 base_controller.go:181] Shutting down StatusSyncer_kube-scheduler ... 2026-03-13T12:38:42.991668427Z I0313 12:38:42.991631 1 base_controller.go:159] All StatusSyncer_kube-scheduler post start hooks have been terminated 2026-03-13T12:38:42.991668427Z I0313 12:38:42.991645 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-13T12:38:42.991668427Z I0313 12:38:42.991643 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T12:38:42.991725119Z I0313 12:38:42.991669 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-13T12:38:42.991725119Z I0313 12:38:42.991672 1 base_controller.go:123] Shutting down worker of kube-scheduler controller ... 2026-03-13T12:38:42.991725119Z I0313 12:38:42.991677 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-13T12:38:42.991725119Z I0313 12:38:42.991689 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-scheduler controller ... 2026-03-13T12:38:42.991725119Z I0313 12:38:42.991684 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T12:38:42.991752310Z I0313 12:38:42.991705 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-13T12:38:42.991752310Z I0313 12:38:42.991688 1 base_controller.go:113] All kube-scheduler workers have been terminated 2026-03-13T12:38:42.991752310Z I0313 12:38:42.991735 1 base_controller.go:181] Shutting down kube-controller-manager-RemoveStaleConditions ... 2026-03-13T12:38:42.991752310Z I0313 12:38:42.991668 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T12:38:42.991776941Z E0313 12:38:42.991582 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": context canceled" 2026-03-13T12:38:42.991798951Z I0313 12:38:42.991772 1 base_controller.go:123] Shutting down worker of kube-controller-manager-RemoveStaleConditions controller ... 2026-03-13T12:38:42.991798951Z I0313 12:38:42.991782 1 base_controller.go:113] All kube-controller-manager-RemoveStaleConditions workers have been terminated 2026-03-13T12:38:42.991798951Z I0313 12:38:42.991717 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T12:38:42.991798951Z I0313 12:38:42.991696 1 base_controller.go:113] All StatusSyncer_kube-scheduler workers have been terminated 2026-03-13T12:38:42.991833143Z I0313 12:38:42.991708 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-13T12:38:42.991833143Z I0313 12:38:42.991798 1 base_controller.go:123] Shutting down worker of kube-scheduler-Node controller ... 2026-03-13T12:38:42.991833143Z I0313 12:38:42.991813 1 base_controller.go:113] All kube-scheduler-Node workers have been terminated 2026-03-13T12:38:42.991833143Z I0313 12:38:42.991731 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-13T12:38:42.991833143Z I0313 12:38:42.991787 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-13T12:38:42.991858204Z I0313 12:38:42.991810 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T12:38:42.991858204Z I0313 12:38:42.991834 1 builder.go:335] server exited 2026-03-13T12:38:42.991858204Z I0313 12:38:42.991831 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-13T12:38:42.991881484Z I0313 12:38:42.991858 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T12:38:42.991902435Z I0313 12:38:42.991883 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-13T12:38:42.991923876Z I0313 12:38:42.991880 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-492717456/tls.crt::/tmp/serving-cert-492717456/tls.key" 2026-03-13T12:38:42.991950087Z I0313 12:38:42.991935 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-13T12:38:42.991976698Z I0313 12:38:42.991960 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-13T12:38:42.993918459Z I0313 12:38:42.992041 1 base_controller.go:181] Shutting down PruneController ... 2026-03-13T12:38:42.993918459Z I0313 12:38:42.992048 1 base_controller.go:181] Shutting down Installer ... 2026-03-13T12:38:42.993918459Z I0313 12:38:42.992061 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-13T12:38:42.993918459Z I0313 12:38:42.992413 1 controller_manager.go:54] cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller terminated 2026-03-13T12:38:42.993918459Z I0313 12:38:42.992444 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-13T12:38:42.993918459Z I0313 12:38:42.992464 1 controller_manager.go:54] kube-scheduler-Node controller terminated 2026-03-13T12:38:42.993918459Z I0313 12:38:42.992475 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-13T12:38:42.993918459Z I0313 12:38:42.992486 1 controller_manager.go:54] GuardController controller terminated 2026-03-13T12:38:42.993918459Z E0313 12:38:42.992992 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-13T12:38:42.993918459Z I0313 12:38:42.993025 1 base_controller.go:123] Shutting down worker of kube-scheduler-InstallerState controller ... 2026-03-13T12:38:42.993918459Z I0313 12:38:42.993036 1 base_controller.go:113] All kube-scheduler-InstallerState workers have been terminated 2026-03-13T12:38:42.993918459Z I0313 12:38:42.993044 1 controller_manager.go:54] kube-scheduler-InstallerState controller terminated 2026-03-13T12:38:42.993918459Z I0313 12:38:42.993075 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-13T12:38:42.993918459Z I0313 12:38:42.993089 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-13T12:38:42.993918459Z I0313 12:38:42.993096 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-13T12:38:42.993918459Z I0313 12:38:42.993105 1 controller_manager.go:54] RevisionController controller terminated 2026-03-13T12:38:42.993918459Z E0313 12:38:42.993208 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-03-13T12:38:42.993918459Z E0313 12:38:42.993275 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock: client rate limiter Wait returned an error: context canceled 2026-03-13T12:38:42.993918459Z I0313 12:38:42.993294 1 leaderelection.go:297] failed to renew lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock: timed out waiting for the condition 2026-03-13T12:38:42.993918459Z I0313 12:38:42.993485 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-13T12:38:42.993918459Z I0313 12:38:42.993494 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-13T12:38:42.993918459Z I0313 12:38:42.993500 1 controller_manager.go:54] PruneController controller terminated 2026-03-13T12:38:42.994331554Z I0313 12:38:42.994082 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-13T12:38:42.994331554Z E0313 12:38:42.994086 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T12:38:42.994331554Z I0313 12:38:42.994101 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-13T12:38:42.994745539Z E0313 12:38:42.994629 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-13T12:38:42.995059561Z W0313 12:38:42.994992 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-13T12:38:42.995059561Z W0313 12:38:42.995015 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-13T12:38:42.995059561Z W0313 12:38:42.995022 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-13T12:38:42.995412473Z E0313 12:38:42.995190 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-13T12:38:42.995412473Z I0313 12:38:42.995230 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-13T12:38:42.995412473Z I0313 12:38:42.995240 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-13T12:38:42.995412473Z I0313 12:38:42.995250 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-13T12:38:42.995543178Z E0313 12:38:42.995469 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/localhost-recovery-client\": context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T12:38:42.995812278Z I0313 12:38:42.995723 1 base_controller.go:123] Shutting down worker of kube-scheduler-StaticPodState controller ... 2026-03-13T12:38:42.995812278Z I0313 12:38:42.995741 1 base_controller.go:113] All kube-scheduler-StaticPodState workers have been terminated 2026-03-13T12:38:42.995812278Z I0313 12:38:42.995748 1 controller_manager.go:54] kube-scheduler-StaticPodState controller terminated 2026-03-13T12:38:42.996388028Z I0313 12:38:42.996341 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-13T12:38:42.996388028Z I0313 12:38:42.996377 1 base_controller.go:113] All Installer workers have been terminated 2026-03-13T12:38:42.996423140Z I0313 12:38:42.996410 1 controller_manager.go:54] Installer controller terminated 2026-03-13T12:38:42.996982890Z I0313 12:38:42.996870 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-13T12:38:42.996982890Z I0313 12:38:42.996894 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-13T12:38:47.989812417Z I0313 12:38:47.989709 1 observer_polling.go:162] Shutting down file observer 2026-03-13T12:39:16.997860437Z E0313 12:39:16.997659 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T12:39:16.997860437Z W0313 12:39:16.997837 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-m8mqj.json0000640000000000000000000001365715155003025032100 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-5c74bfc494-m8mqj","generateName":"openshift-kube-scheduler-operator-5c74bfc494-","namespace":"openshift-kube-scheduler-operator","uid":"0da84bb7-e936-49a0-96b5-614a1305d6a4","resourceVersion":"9152","creationTimestamp":"2026-03-13T12:35:29Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"5c74bfc494"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.19/23\"],\"mac_address\":\"0a:58:0a:80:00:13\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.19/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.19\"\n ],\n \"mac\": \"0a:58:0a:80:00:13\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-5c74bfc494","uid":"c0e89072-98fa-4ce0-8bb4-a783f7e7638d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:26Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.19","podIPs":[{"ip":"10.128.0.19"}],"startTime":"2026-03-13T12:37:21Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-03-13T12:40:14Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T12:37:31Z","finishedAt":"2026-03-13T12:39:17Z","containerID":"cri-o://7049109a836522af070e6bb63ef4a03a6cf57954c7a7d1ea2471e59144150127"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","containerID":"cri-o://e0b901efadc576656657aa4dea0a09b5c987c11cdc88e24aaeef0848d60cd3b7","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-3-master-0/installer_current.log0000640000000000000000000001513615155003025027161 0ustar00000000000000002026-03-13T12:38:19.948094804Z I0313 12:38:19.945867 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc000aada40 cert-secrets:0xc000aad7c0 configmaps:0xc000aad360 namespace:0xc000aad180 optional-configmaps:0xc000aad4a0 optional-secrets:0xc000aad400 pod:0xc000aad220 pod-manifest-dir:0xc000aad5e0 resource-dir:0xc000aad540 revision:0xc000aad0e0 secrets:0xc000aad2c0 v:0xc000ac2500] [0xc000ac2500 0xc000aad0e0 0xc000aad180 0xc000aad220 0xc000aad540 0xc000aad5e0 0xc000aad360 0xc000aad4a0 0xc000aad400 0xc000aad2c0 0xc000aada40 0xc000aad7c0] [] map[cert-configmaps:0xc000aad860 cert-dir:0xc000aada40 cert-secrets:0xc000aad7c0 configmaps:0xc000aad360 help:0xc000ac28c0 kubeconfig:0xc000aad040 log-flush-frequency:0xc000ac2460 namespace:0xc000aad180 optional-cert-configmaps:0xc000aad9a0 optional-cert-secrets:0xc000aad900 optional-configmaps:0xc000aad4a0 optional-secrets:0xc000aad400 pod:0xc000aad220 pod-manifest-dir:0xc000aad5e0 pod-manifests-lock-file:0xc000aad720 resource-dir:0xc000aad540 revision:0xc000aad0e0 secrets:0xc000aad2c0 timeout-duration:0xc000aad680 v:0xc000ac2500 vmodule:0xc000ac25a0] [0xc000aad040 0xc000aad0e0 0xc000aad180 0xc000aad220 0xc000aad2c0 0xc000aad360 0xc000aad400 0xc000aad4a0 0xc000aad540 0xc000aad5e0 0xc000aad680 0xc000aad720 0xc000aad7c0 0xc000aad860 0xc000aad900 0xc000aad9a0 0xc000aada40 0xc000ac2460 0xc000ac2500 0xc000ac25a0 0xc000ac28c0] [0xc000aad860 0xc000aada40 0xc000aad7c0 0xc000aad360 0xc000ac28c0 0xc000aad040 0xc000ac2460 0xc000aad180 0xc000aad9a0 0xc000aad900 0xc000aad4a0 0xc000aad400 0xc000aad220 0xc000aad5e0 0xc000aad720 0xc000aad540 0xc000aad0e0 0xc000aad2c0 0xc000aad680 0xc000ac2500 0xc000ac25a0] map[104:0xc000ac28c0 118:0xc000ac2500] [] -1 0 0xc000a92c60 true 0x223d9a0 []} 2026-03-13T12:38:19.948094804Z I0313 12:38:19.946126 1 cmd.go:96] (*installerpod.InstallOptions)(0xc00094e9c0)({ 2026-03-13T12:38:19.948094804Z KubeConfig: (string) "", 2026-03-13T12:38:19.948094804Z KubeClient: (kubernetes.Interface) , 2026-03-13T12:38:19.948094804Z Revision: (string) (len=1) "3", 2026-03-13T12:38:19.948094804Z NodeName: (string) "", 2026-03-13T12:38:19.948094804Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-03-13T12:38:19.948094804Z Clock: (clock.RealClock) { 2026-03-13T12:38:19.948094804Z }, 2026-03-13T12:38:19.948094804Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-03-13T12:38:19.948094804Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T12:38:19.948094804Z (string) (len=31) "localhost-recovery-client-token" 2026-03-13T12:38:19.948094804Z }, 2026-03-13T12:38:19.948094804Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T12:38:19.948094804Z (string) (len=12) "serving-cert" 2026-03-13T12:38:19.948094804Z }, 2026-03-13T12:38:19.948094804Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-03-13T12:38:19.948094804Z (string) (len=18) "kube-scheduler-pod", 2026-03-13T12:38:19.948094804Z (string) (len=6) "config", 2026-03-13T12:38:19.948094804Z (string) (len=17) "serviceaccount-ca", 2026-03-13T12:38:19.948094804Z (string) (len=20) "scheduler-kubeconfig", 2026-03-13T12:38:19.948094804Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-03-13T12:38:19.948094804Z }, 2026-03-13T12:38:19.948094804Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T12:38:19.948094804Z (string) (len=16) "policy-configmap" 2026-03-13T12:38:19.948094804Z }, 2026-03-13T12:38:19.948094804Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-03-13T12:38:19.948094804Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-03-13T12:38:19.948094804Z }, 2026-03-13T12:38:19.948094804Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-13T12:38:19.948094804Z CertConfigMapNamePrefixes: ([]string) , 2026-03-13T12:38:19.948094804Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-03-13T12:38:19.948094804Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-03-13T12:38:19.948094804Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-13T12:38:19.948094804Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-13T12:38:19.948094804Z Timeout: (time.Duration) 2m0s, 2026-03-13T12:38:19.948094804Z StaticPodManifestsLockFile: (string) "", 2026-03-13T12:38:19.948094804Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-13T12:38:19.948094804Z KubeletVersion: (string) "" 2026-03-13T12:38:19.948094804Z }) 2026-03-13T12:38:19.949203335Z I0313 12:38:19.949168 1 cmd.go:413] Getting controller reference for node master-0 2026-03-13T12:38:19.978097577Z I0313 12:38:19.972743 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-13T12:38:19.978097577Z I0313 12:38:19.972795 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T12:38:19.978097577Z I0313 12:38:19.972804 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T12:38:19.978911696Z I0313 12:38:19.978683 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-03-13T12:38:30.080215501Z I0313 12:38:30.078086 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-03-13T12:38:53.982757848Z W0313 12:38:53.982533 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T12:39:13.984649389Z W0313 12:39:13.984441 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T12:39:33.984012181Z W0313 12:39:33.983888 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T12:39:47.986733699Z W0313 12:39:47.986573 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T12:39:47.986798331Z F0313 12:39:47.986714 1 cmd.go:109] timed out waiting for the condition config/pod/openshift-kube-scheduler/installer-3-master-0.json0000640000000000000000000001632515155003025022647 0ustar0000000000000000{"metadata":{"name":"installer-3-master-0","namespace":"openshift-kube-scheduler","uid":"bfabb495-1707-4c3d-b00e-2f3b2976fb92","resourceVersion":"9147","creationTimestamp":"2026-03-13T12:38:17Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.46/23\"],\"mac_address\":\"0a:58:0a:80:00:2e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.46/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.46\"\n ],\n \"mac\": \"0a:58:0a:80:00:2e\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-3","uid":"0676f9f8-aae9-4454-8bb1-6c7360d49ce8"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=3","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:14Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:17Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:13Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:13Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:17Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.46","podIPs":[{"ip":"10.128.0.46"}],"startTime":"2026-03-13T12:38:17Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0313 12:38:19.949168 1 cmd.go:413] Getting controller reference for node master-0\nI0313 12:38:19.972743 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0313 12:38:19.972795 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0313 12:38:19.972804 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0313 12:38:19.978683 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nI0313 12:38:30.078086 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nW0313 12:38:53.982533 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0313 12:39:13.984441 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0313 12:39:33.983888 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0313 12:39:47.986573 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0313 12:39:47.986714 1 cmd.go:109] timed out waiting for the condition\n","startedAt":"2026-03-13T12:38:19Z","finishedAt":"2026-03-13T12:39:48Z","containerID":"cri-o://d8cf37e4c8a527d04eff5203f40779f993e328715e0f8f8ef7b2ff90bad966cf"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","containerID":"cri-o://d8cf37e4c8a527d04eff5203f40779f993e328715e0f8f8ef7b2ff90bad966cf","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000004244515155003025030222 0ustar00000000000000002026-03-13T12:39:51.208096064Z weight: 1 2026-03-13T12:39:51.208096064Z - name: VolumeRestrictions 2026-03-13T12:39:51.208096064Z weight: 0 2026-03-13T12:39:51.208096064Z - name: NodeVolumeLimits 2026-03-13T12:39:51.208096064Z weight: 0 2026-03-13T12:39:51.208096064Z - name: VolumeBinding 2026-03-13T12:39:51.208096064Z weight: 0 2026-03-13T12:39:51.208096064Z - name: VolumeZone 2026-03-13T12:39:51.208096064Z weight: 0 2026-03-13T12:39:51.208096064Z - name: PodTopologySpread 2026-03-13T12:39:51.208096064Z weight: 2 2026-03-13T12:39:51.208096064Z - name: InterPodAffinity 2026-03-13T12:39:51.208096064Z weight: 2 2026-03-13T12:39:51.208096064Z - name: DefaultPreemption 2026-03-13T12:39:51.208096064Z weight: 0 2026-03-13T12:39:51.208096064Z - name: NodeResourcesBalancedAllocation 2026-03-13T12:39:51.208096064Z weight: 1 2026-03-13T12:39:51.208096064Z - name: ImageLocality 2026-03-13T12:39:51.208096064Z weight: 1 2026-03-13T12:39:51.208096064Z - name: DefaultBinder 2026-03-13T12:39:51.208096064Z weight: 0 2026-03-13T12:39:51.208096064Z permit: {} 2026-03-13T12:39:51.208096064Z postBind: {} 2026-03-13T12:39:51.208096064Z postFilter: {} 2026-03-13T12:39:51.208096064Z preBind: {} 2026-03-13T12:39:51.208096064Z preEnqueue: {} 2026-03-13T12:39:51.208096064Z preFilter: {} 2026-03-13T12:39:51.208096064Z preScore: {} 2026-03-13T12:39:51.208096064Z queueSort: {} 2026-03-13T12:39:51.208096064Z reserve: {} 2026-03-13T12:39:51.208096064Z score: {} 2026-03-13T12:39:51.208096064Z schedulerName: default-scheduler 2026-03-13T12:39:51.208096064Z > 2026-03-13T12:39:51.210354545Z I0313 12:39:51.210192 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-03-13T12:39:51.210354545Z I0313 12:39:51.210222 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-03-13T12:39:51.212871612Z I0313 12:39:51.212823 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T12:39:51.212947064Z I0313 12:39:51.212911 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T12:39:51.213093317Z I0313 12:39:51.213044 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2026-03-13T12:39:51.213093317Z I0313 12:39:51.213065 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773405530\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773405530\" (2026-03-13 11:38:50 +0000 UTC to 2027-03-13 11:38:50 +0000 UTC (now=2026-03-13 12:39:51.213009595 +0000 UTC))" 2026-03-13T12:39:51.213470695Z I0313 12:39:51.213323 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773405531\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773405530\" (2026-03-13 11:38:50 +0000 UTC to 2029-03-13 11:38:50 +0000 UTC (now=2026-03-13 12:39:51.213302312 +0000 UTC))" 2026-03-13T12:39:51.213470695Z I0313 12:39:51.213398 1 secure_serving.go:213] Serving securely on [::]:10259 2026-03-13T12:39:51.214000747Z I0313 12:39:51.213862 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T12:39:51.216210777Z I0313 12:39:51.215825 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:39:51.216258558Z I0313 12:39:51.216203 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:39:51.217678200Z I0313 12:39:51.216788 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:39:51.217678200Z I0313 12:39:51.217318 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-13T12:39:51.220208677Z I0313 12:39:51.217760 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:39:51.220208677Z I0313 12:39:51.218016 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:39:51.220208677Z I0313 12:39:51.218066 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:39:51.220208677Z I0313 12:39:51.218228 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:39:51.220208677Z I0313 12:39:51.218261 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:39:51.222025878Z I0313 12:39:51.221798 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:39:51.223383728Z I0313 12:39:51.223284 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:39:51.223383728Z I0313 12:39:51.223358 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:39:51.223675845Z I0313 12:39:51.223585 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-13T12:39:51.225333802Z I0313 12:39:51.225257 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:39:51.227304747Z I0313 12:39:51.226582 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:39:51.235973422Z I0313 12:39:51.235841 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:39:51.237940865Z I0313 12:39:51.237866 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:39:51.313610819Z I0313 12:39:51.313533 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T12:39:51.313808454Z I0313 12:39:51.313762 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-03-13T12:39:51.314053739Z I0313 12:39:51.313999 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 12:19:46 +0000 UTC to 2036-03-10 12:19:46 +0000 UTC (now=2026-03-13 12:39:51.313967657 +0000 UTC))" 2026-03-13T12:39:51.314053739Z I0313 12:39:51.314041 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-13 12:26:40 +0000 UTC to 2026-03-14 12:26:40 +0000 UTC (now=2026-03-13 12:39:51.314035879 +0000 UTC))" 2026-03-13T12:39:51.314066079Z I0313 12:39:51.314054 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-13 12:26:40 +0000 UTC to 2027-03-13 12:26:40 +0000 UTC (now=2026-03-13 12:39:51.314050359 +0000 UTC))" 2026-03-13T12:39:51.314074980Z I0313 12:39:51.314064 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-13 12:26:41 +0000 UTC to 2027-03-13 12:26:41 +0000 UTC (now=2026-03-13 12:39:51.314060649 +0000 UTC))" 2026-03-13T12:39:51.314083770Z I0313 12:39:51.314075 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 12:26:38 +0000 UTC to 2036-03-10 12:26:38 +0000 UTC (now=2026-03-13 12:39:51.31407091 +0000 UTC))" 2026-03-13T12:39:51.314290304Z I0313 12:39:51.314254 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773405530\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773405530\" (2026-03-13 11:38:50 +0000 UTC to 2027-03-13 11:38:50 +0000 UTC (now=2026-03-13 12:39:51.314246233 +0000 UTC))" 2026-03-13T12:39:51.314391267Z I0313 12:39:51.314355 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773405531\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773405530\" (2026-03-13 11:38:50 +0000 UTC to 2029-03-13 11:38:50 +0000 UTC (now=2026-03-13 12:39:51.314346626 +0000 UTC))" 2026-03-13T12:39:56.314880524Z E0313 12:39:56.314702 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T12:40:03.774116533Z E0313 12:40:03.774013 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T12:40:12.213928331Z E0313 12:40:12.213790 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T12:40:37.431432388Z I0313 12:40:37.431315 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-03-13T12:40:37.432183127Z I0313 12:40:37.432105 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-79f8cd6fdd-wtf6j" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:40:37.432860520Z I0313 12:40:37.432813 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-7c67b67d47-5bb88" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:40:37.438244049Z I0313 12:40:37.437936 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-9x9vk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:40:37.443174336Z I0313 12:40:37.441879 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-p9csk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:40:37.660035355Z I0313 12:40:37.659525 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-zh888" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:40:38.860258396Z I0313 12:40:38.859097 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-5czx2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:40:45.405687428Z I0313 12:40:45.404205 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-955fcfb87-bffng" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:40:45.513189856Z I0313 12:40:45.509823 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945-9ccr9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:40:45.513189856Z I0313 12:40:45.510189 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-8f89dfddd-vxk8z" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:40:45.516180305Z I0313 12:40:45.515305 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-664cb58b85-m5499" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:40:45.520173425Z I0313 12:40:45.518166 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-6fbfc8dc8f-jhtsp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:40:45.524180136Z I0313 12:40:45.523963 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-55d85b7b47-rvp8c" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:40:45.626065683Z I0313 12:40:45.625433 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-6686554ddc-btz8w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:40:45.635184839Z I0313 12:40:45.635052 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-5cdb4c5598-l6jp5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:40:45.636167858Z I0313 12:40:45.635737 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-84bf6db4f9-mjxcz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:40:45.655183920Z I0313 12:40:45.654745 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-69576476f7-sqndx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:40:45.705206182Z I0313 12:40:45.703918 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-pmzkf" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:40:45.726186641Z I0313 12:40:45.725833 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-5c5f6764b5-96ktp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:40:45.726186641Z I0313 12:40:45.726038 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-fdb5c78b5-6g8qj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:40:58.404026199Z I0313 12:40:58.403443 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-daemon-5h8rc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:41:30.398340985Z I0313 12:41:30.396974 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496-x2wlg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:41:30.561890049Z I0313 12:41:30.561820 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-754bdc9f9d-cwl2p" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:41:46.738194461Z I0313 12:41:46.737627 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-controller-ff46b7bdf-kmnlv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:41:48.826807055Z I0313 12:41:48.826733 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-pmzkf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:41:48.827058852Z I0313 12:41:48.827031 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress/router-default-79f8cd6fdd-wtf6j" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:41:48.837076106Z I0313 12:41:48.833878 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-source-7c67b67d47-5bb88" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:41:48.867824215Z I0313 12:41:48.867102 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-canary/ingress-canary-h8skx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:41:53.307193137Z I0313 12:41:53.307059 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-server-6crtf" node="master-0" evaluatedNodes=1 feasibleNodes=1 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006677215155003025030425 0ustar00000000000000002026-03-13T12:35:10.988551292Z I0313 12:35:10.988453 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-bqsgz" 2026-03-13T12:35:14.991454157Z I0313 12:35:14.991358 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-bqsgz" 2026-03-13T12:35:22.997693688Z I0313 12:35:22.997602 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-bqsgz" 2026-03-13T12:35:28.837384512Z I0313 12:35:28.837274 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-13T12:35:28.928198498Z I0313 12:35:28.928077 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5685fbc7d-97wkd" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:29.027578151Z I0313 12:35:29.027062 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8565d84698-hj2wk" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:29.123559002Z I0313 12:35:29.123438 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-etcd-operator/etcd-operator-5884b9cd56-hjzms" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:29.224322898Z I0313 12:35:29.224026 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-dns-operator/dns-operator-589895fbb7-mmwk7" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:29.337711020Z I0313 12:35:29.337599 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-745944c6b7-mbjxt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:35:29.424376296Z I0313 12:35:29.424312 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-config-operator/openshift-config-operator-64488f9d78-t8fb4" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:29.524429346Z I0313 12:35:29.524353 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-m8mqj" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:29.653179119Z I0313 12:35:29.651614 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-86d7cdfdfb-br96g" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:29.723376137Z I0313 12:35:29.723317 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-qxmnf" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:29.825775423Z I0313 12:35:29.825701 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-tlnkd" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:29.926593591Z I0313 12:35:29.926532 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress-operator/ingress-operator-677db989d6-ckl2j" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:30.026957848Z I0313 12:35:30.026867 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-image-registry/cluster-image-registry-operator-86d6d77c7c-q287n" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:30.125896080Z I0313 12:35:30.125611 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/cluster-monitoring-operator-674cbfbd9d-zwtdz" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:30.225861828Z I0313 12:35:30.225763 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-marketplace/marketplace-operator-64bf9778cb-7qhr4" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:30.324678797Z I0313 12:35:30.324595 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-service-ca-operator/service-ca-operator-69b6fc6b88-vmscz" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:30.425620958Z I0313 12:35:30.425540 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rfqb9" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:30.536419317Z I0313 12:35:30.536318 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/network-operator-7c649bf6d4-kh6n9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:35:30.628609266Z I0313 12:35:30.628436 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-669qk" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:30.727943028Z I0313 12:35:30.727766 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-7f65c457f5-hrm82" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:30.826737418Z I0313 12:35:30.826633 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-xchrj" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:30.928594190Z I0313 12:35:30.928464 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-olm-operator/cluster-olm-operator-77899cf6d-7nvbn" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:31.026521108Z I0313 12:35:31.026403 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-66c7586884-cz8pc" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:31.126609238Z I0313 12:35:31.126543 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-authentication-operator/authentication-operator-7c6989d6c4-tc4ht" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:35:33.011217372Z I0313 12:35:33.011054 1 schedule_one.go:314] "Successfully bound pod to node" pod="assisted-installer/assisted-installer-controller-bqsgz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:36:06.730867351Z I0313 12:36:06.730533 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/mtu-prober-5tvzj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:36:16.629767018Z I0313 12:36:16.629644 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-bnn7n" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:36:16.819510091Z I0313 12:36:16.819181 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-additional-cni-plugins-78p2k" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:36:17.608825417Z I0313 12:36:17.608592 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/network-metrics-daemon-r9lmb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:36:19.620235008Z I0313 12:36:19.620155 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-multus/multus-admission-controller-8d675b596-96gds" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:36:29.030839716Z I0313 12:36:29.030649 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-66b55d57d-5cww5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:36:29.226835167Z I0313 12:36:29.226721 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-fn8qb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:36:31.205139741Z I0313 12:36:31.204703 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-7c67b67d47-5bb88" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:36:32.202097646Z I0313 12:36:32.200062 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-pnwsc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:36:34.817684706Z I0313 12:36:34.816865 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-qg8q5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:36:58.390973740Z I0313 12:36:58.390304 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-h8fwp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:20.988620528Z I0313 12:37:20.987635 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-5884b9cd56-hjzms" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:20.996607312Z I0313 12:37:20.992842 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-m8mqj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:20.996607312Z I0313 12:37:20.993247 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-64488f9d78-t8fb4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:20.996607312Z I0313 12:37:20.993590 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5685fbc7d-97wkd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:20.996607312Z I0313 12:37:20.993645 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-589895fbb7-mmwk7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:20.996710404Z I0313 12:37:20.996660 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-86d7cdfdfb-br96g" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:21.003216127Z I0313 12:37:21.002778 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8565d84698-hj2wk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:21.003216127Z I0313 12:37:21.002888 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-tlnkd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:21.003216127Z I0313 12:37:21.002973 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-677db989d6-ckl2j" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:21.003216127Z I0313 12:37:21.003053 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-xchrj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:21.003216127Z I0313 12:37:21.003103 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-86d6d77c7c-q287n" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:21.005965296Z I0313 12:37:21.003325 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-69b6fc6b88-vmscz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:21.005965296Z I0313 12:37:21.003857 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-64bf9778cb-7qhr4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:21.005965296Z I0313 12:37:21.003983 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-qxmnf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:21.014937924Z I0313 12:37:21.013673 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-669qk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:21.014937924Z I0313 12:37:21.013936 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-8d675b596-96gds" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:21.014937924Z I0313 12:37:21.013984 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-7c6989d6c4-tc4ht" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:21.014937924Z I0313 12:37:21.014023 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rfqb9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:21.014937924Z I0313 12:37:21.014185 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-66c7586884-cz8pc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:21.014937924Z I0313 12:37:21.014230 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-674cbfbd9d-zwtdz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:21.014937924Z I0313 12:37:21.014269 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-77899cf6d-7nvbn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:21.025048299Z I0313 12:37:21.017540 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-7f65c457f5-hrm82" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:21.077280386Z I0313 12:37:21.075596 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-qz6pg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:34.272463628Z I0313 12:37:34.269816 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-7577d6f48-pjpn2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:40.994251719Z I0313 12:37:40.994120 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6f7fd6c796-sjzpb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:42.287499188Z I0313 12:37:42.287356 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-54f4b89bbb-sb5x4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:42.289587078Z I0313 12:37:42.288437 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5b8775d4fd-2s9f6" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T12:37:44.074495357Z I0313 12:37:44.074417 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-5b8775d4fd-2s9f6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:44.189186227Z I0313 12:37:44.185695 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-988c89bfb-rl6tb" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T12:37:45.372184180Z I0313 12:37:45.370544 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-84bfdbbb7f-4pksg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:46.088695773Z I0313 12:37:46.088617 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-988c89bfb-rl6tb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:46.767374247Z I0313 12:37:46.767062 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-57ccdf9b5-7pcdp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:57.231282980Z I0313 12:37:57.230694 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-6598bfb6c4-dv8rj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:57.413073448Z I0313 12:37:57.412984 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-7f8b8b6f4c-8fjzg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:58.261351166Z I0313 12:37:58.258911 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-7cbf874688-d4wjw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:37:59.629036970Z I0313 12:37:59.628553 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-6b7d89b46f-h7w7h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:38:00.838337140Z I0313 12:38:00.838223 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-f4cd854d4-4p7j6" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T12:38:00.892641087Z I0313 12:38:00.892349 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-b799f66dc-95b9f" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T12:38:02.139082037Z I0313 12:38:02.138990 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-844bc54c88-vznst" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T12:38:02.530731677Z I0313 12:38:02.530277 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-f4cd854d4-4p7j6" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T12:38:02.540495825Z I0313 12:38:02.539826 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-b799f66dc-95b9f" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:38:03.468179579Z I0313 12:38:03.468097 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-844bc54c88-vznst" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T12:38:05.253885459Z I0313 12:38:05.253357 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-oauth-apiserver/apiserver-787dbf5bb9-5645n" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T12:38:05.478995277Z I0313 12:38:05.478926 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-f4cd854d4-4p7j6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:38:05.479445184Z I0313 12:38:05.479421 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-844bc54c88-vznst" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:38:13.681535400Z I0313 12:38:13.679179 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-6tlzf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:38:15.172164121Z I0313 12:38:15.172039 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-787dbf5bb9-5645n" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:38:15.342378097Z I0313 12:38:15.342289 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-m7k6m" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:38:15.609672486Z I0313 12:38:15.609583 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-79f8cd6fdd-wtf6j" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T12:38:15.835521586Z I0313 12:38:15.835261 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-xpz47" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:38:20.548792769Z I0313 12:38:20.548625 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-8b998ff89-g8rgp" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T12:38:20.647572425Z I0313 12:38:20.647164 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-784b8dc7f8-4czh5" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T12:38:22.386865711Z I0313 12:38:22.386766 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-8b998ff89-g8rgp" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T12:38:22.397528219Z I0313 12:38:22.396882 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-784b8dc7f8-4czh5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:38:24.662912984Z I0313 12:38:24.661690 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-8b998ff89-g8rgp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:38:29.106206529Z I0313 12:38:29.106052 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-8c9c967c7-98tv2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T12:38:39.755388894Z E0313 12:38:39.755141 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path 2026-03-13T12:38:44.754996358Z E0313 12:38:44.754853 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-03-13T12:38:44.754996358Z I0313 12:38:44.754917 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2026-03-13T12:38:49.756183109Z E0313 12:38:49.756017 1 leaderelection.go:322] Failed to release lock: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T12:38:49.756183109Z E0313 12:38:49.756110 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515155003025023000 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"f64b5fcc-cad4-48a4-a0c1-74a70da407fb","resourceVersion":"9122","creationTimestamp":"2026-03-13T12:36:29Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"a1a56802af72ce1aac6b5077f1695ac0","kubernetes.io/config.mirror":"a1a56802af72ce1aac6b5077f1695ac0","kubernetes.io/config.seen":"2026-03-13T12:34:54.823767514Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"c456d6c3-a916-4f05-9928-7e43433a4d22","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:25Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:25Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:51Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:51Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:25Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T12:37:25Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-03-13T12:38:50Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-03-13T12:35:05Z","finishedAt":"2026-03-13T12:38:50Z","containerID":"cri-o://23aef1d459d801451207b22b103d82e16b0fb29eac9febd8e8918cd59b44679c"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","containerID":"cri-o://74509294773fbb5f73a8dd8c9003ceebee4b1e194cad14d7465b52eca3b8eaab","started":true}],"qosClass":"Burstable"}}cluster-policy-controller_current.log0000640000000000000000000011231515155003025034207 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-13T12:35:20.024299688Z I0313 12:35:20.024232 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-13T12:35:23.467252954Z W0313 12:35:23.467188 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T12:35:23.467501360Z E0313 12:35:23.467468 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T12:35:34.233957343Z W0313 12:35:34.233848 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T12:35:34.233957343Z E0313 12:35:34.233925 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T12:35:48.508959267Z W0313 12:35:48.508869 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T12:35:48.508959267Z E0313 12:35:48.508924 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T12:36:12.906900417Z E0313 12:36:12.906792 1 leaderelection.go:429] Failed to update lock optimitically: Operation cannot be fulfilled on leases.coordination.k8s.io "cluster-policy-controller-lock": StorageError: invalid object, Code: 4, Key: /kubernetes.io/leases/kube-system/cluster-policy-controller-lock, ResourceVersion: 0, AdditionalErrorMsg: Precondition failed: UID in precondition: 75503d8a-b475-4f9c-b3d2-11834eb660a2, UID in object meta: , falling back to slow path 2026-03-13T12:36:13.954414126Z I0313 12:36:13.954335 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-multus namespace 2026-03-13T12:36:14.823204091Z I0313 12:36:14.823081 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-03-13T12:36:14.980328388Z I0313 12:36:14.980091 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-03-13T12:36:20.042769402Z I0313 12:36:20.042692 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [k8s.cni.cncf.io/v1, Resource=network-attachment-definitions whereabouts.cni.cncf.io/v1alpha1, Resource=ippools whereabouts.cni.cncf.io/v1alpha1, Resource=nodeslicepools whereabouts.cni.cncf.io/v1alpha1, Resource=overlappingrangeipreservations], removed: [] 2026-03-13T12:36:20.042893424Z I0313 12:36:20.042862 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="nodeslicepools.whereabouts.cni.cncf.io" 2026-03-13T12:36:20.042945515Z I0313 12:36:20.042917 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="network-attachment-definitions.k8s.cni.cncf.io" 2026-03-13T12:36:20.042980126Z I0313 12:36:20.042955 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ippools.whereabouts.cni.cncf.io" 2026-03-13T12:36:20.042980126Z I0313 12:36:20.042976 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="overlappingrangeipreservations.whereabouts.cni.cncf.io" 2026-03-13T12:36:20.054359310Z I0313 12:36:20.054300 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T12:36:20.066193322Z I0313 12:36:20.065214 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T12:36:20.074766478Z I0313 12:36:20.074709 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T12:36:20.084593336Z I0313 12:36:20.083540 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T12:36:20.143983472Z I0313 12:36:20.143921 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-13T12:36:20.591255689Z I0313 12:36:20.591191 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ovn-kubernetes namespace 2026-03-13T12:36:28.593700632Z I0313 12:36:28.593607 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-host-network namespace 2026-03-13T12:36:29.792672351Z I0313 12:36:29.792596 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-diagnostics namespace 2026-03-13T12:36:33.010950516Z I0313 12:36:33.010888 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-node-identity namespace 2026-03-13T12:36:33.378301776Z I0313 12:36:33.378227 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "network-node-identity" not found 2026-03-13T12:36:33.779247281Z I0313 12:36:33.779172 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "network-node-identity-leases" not found 2026-03-13T12:36:39.215994866Z W0313 12:36:39.215928 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T12:36:39.216047196Z E0313 12:36:39.216020 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T12:36:50.156642783Z I0313 12:36:50.154462 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [k8s.cni.cncf.io/v1alpha1, Resource=ipamclaims k8s.ovn.org/v1, Resource=egressfirewalls k8s.ovn.org/v1, Resource=egressqoses k8s.ovn.org/v1, Resource=egressservices k8s.ovn.org/v1, Resource=userdefinednetworks], removed: [] 2026-03-13T12:36:50.156642783Z I0313 12:36:50.154693 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressservices.k8s.ovn.org" 2026-03-13T12:36:50.156642783Z I0313 12:36:50.154789 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ipamclaims.k8s.cni.cncf.io" 2026-03-13T12:36:50.156642783Z I0313 12:36:50.154826 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressqoses.k8s.ovn.org" 2026-03-13T12:36:50.156642783Z I0313 12:36:50.154890 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="userdefinednetworks.k8s.ovn.org" 2026-03-13T12:36:50.156642783Z I0313 12:36:50.154932 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressfirewalls.k8s.ovn.org" 2026-03-13T12:36:50.157045690Z I0313 12:36:50.157004 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T12:36:50.157257744Z I0313 12:36:50.157231 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T12:36:50.157415956Z I0313 12:36:50.157388 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T12:36:50.157675780Z I0313 12:36:50.157651 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T12:36:50.157888674Z I0313 12:36:50.157854 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T12:36:50.256285407Z I0313 12:36:50.256237 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-13T12:37:13.508204582Z W0313 12:37:13.508098 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T12:37:13.508294253Z E0313 12:37:13.508267 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T12:37:39.842763476Z I0313 12:37:39.842645 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-catalogd namespace 2026-03-13T12:37:39.862485338Z I0313 12:37:39.861105 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-operator-controller namespace 2026-03-13T12:37:40.280751988Z I0313 12:37:40.280625 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-controller-manager namespace 2026-03-13T12:37:40.417695476Z I0313 12:37:40.417620 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-route-controller-manager namespace 2026-03-13T12:37:41.791290814Z I0313 12:37:41.791231 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-oauth-apiserver namespace 2026-03-13T12:37:43.731209878Z I0313 12:37:43.731125 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-service-ca namespace 2026-03-13T12:37:45.592289347Z I0313 12:37:45.592230 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-authentication namespace 2026-03-13T12:37:45.743906724Z I0313 12:37:45.727622 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-kube-storage-version-migrator namespace 2026-03-13T12:37:50.282997260Z I0313 12:37:50.279997 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [snapshot.storage.k8s.io/v1, Resource=volumesnapshots], removed: [] 2026-03-13T12:37:50.282997260Z I0313 12:37:50.280408 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="volumesnapshots.snapshot.storage.k8s.io" 2026-03-13T12:37:50.282997260Z I0313 12:37:50.281889 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T12:37:50.381425107Z I0313 12:37:50.381230 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-13T12:37:51.080114306Z I0313 12:37:51.075606 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-apiserver namespace 2026-03-13T12:37:51.560404323Z I0313 12:37:51.560283 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T12:37:57.042187476Z I0313 12:37:57.039210 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:openshift:useroauthaccesstoken-manager" not found 2026-03-13T12:37:57.596207047Z W0313 12:37:57.596129 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T12:37:57.596256777Z E0313 12:37:57.596231 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T12:38:14.076888072Z I0313 12:38:14.076794 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-dns namespace 2026-03-13T12:38:15.414422749Z I0313 12:38:15.414361 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ingress namespace 2026-03-13T12:38:23.548678118Z I0313 12:38:23.548558 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-03-13T12:38:24.254375144Z I0313 12:38:24.253715 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift namespace 2026-03-13T12:38:24.273764440Z I0313 12:38:24.273702 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-node namespace 2026-03-13T12:38:50.402620238Z I0313 12:38:50.402449 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T12:38:50.402620238Z E0313 12:38:50.402594 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T12:38:53.212287784Z W0313 12:38:53.212189 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-13T12:38:53.212287784Z E0313 12:38:53.212258 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-13T12:39:20.415857762Z I0313 12:39:20.415649 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T12:39:20.415944454Z E0313 12:39:20.415915 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T12:39:25.590798975Z W0313 12:39:25.590667 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-13T12:39:25.590798975Z E0313 12:39:25.590753 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-13T12:39:47.404398563Z E0313 12:39:47.404270 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-13T12:39:50.431041204Z I0313 12:39:50.430785 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T12:39:50.431343281Z E0313 12:39:50.431172 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T12:40:10.960061340Z W0313 12:40:10.959981 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-13T12:40:10.960123021Z E0313 12:40:10.960063 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-13T12:40:20.439873613Z I0313 12:40:20.439753 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T12:40:20.439873613Z E0313 12:40:20.439851 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T12:40:26.542008527Z I0313 12:40:26.541827 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ingress-canary namespace 2026-03-13T12:40:33.815074170Z I0313 12:40:33.814964 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-hpslm" has been approved 2026-03-13T12:40:34.420722038Z I0313 12:40:34.420645 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-03-13T12:40:34.840247145Z I0313 12:40:34.838243 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-2vf68" has been approved 2026-03-13T12:40:37.675737720Z I0313 12:40:37.674288 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s" not found 2026-03-13T12:40:41.163645271Z I0313 12:40:41.163599 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-cluster-autoscaler-operator" not found 2026-03-13T12:40:41.263951238Z I0313 12:40:41.263900 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "openshift-marketplace-metrics" not found 2026-03-13T12:40:42.870186931Z I0313 12:40:42.870096 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-03-13T12:40:43.320553430Z I0313 12:40:43.320504 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-03-13T12:40:43.571304063Z I0313 12:40:43.571249 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-machine-api-operator" not found 2026-03-13T12:40:50.502191200Z I0313 12:40:50.502043 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T12:40:50.502263644Z E0313 12:40:50.502219 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T12:41:00.945796480Z W0313 12:41:00.945668 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-13T12:41:00.945888862Z E0313 12:41:00.945828 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-13T12:41:20.510423062Z I0313 12:41:20.510322 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T12:41:20.510475564Z E0313 12:41:20.510425 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T12:41:50.521590381Z I0313 12:41:50.520321 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T12:41:50.521590381Z E0313 12:41:50.520458 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T12:41:50.712304913Z W0313 12:41:50.710830 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-13T12:41:50.712304913Z E0313 12:41:50.710911 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" kube-controller-manager_current.log0000640000000000000000000006772715155003025033607 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-13T12:40:48.799470322Z I0313 12:40:48.799435 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/KubeStorageVersionMigrator, namespace: , name: cluster, uid: 4d51ac2a-4a5a-4031-82b3-c5ef17b24034]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582"}] 2026-03-13T12:40:48.803222740Z I0313 12:40:48.803178 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/Authentication, namespace: , name: cluster, uid: eb22b748-cb3b-4796-9bd6-6ef13554c059]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582"}] 2026-03-13T12:40:48.805825370Z I0313 12:40:48.805776 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[admissionregistration.k8s.io/v1/ValidatingAdmissionPolicyBinding, namespace: , name: user-defined-networks-namespace-label-binding, uid: 62d9c961-7ac7-48c0-a231-f9b8fb6d6595]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"7e9152e6-38e3-4536-8603-a138d1af3fd0","controller":true,"blockOwnerDeletion":true}] 2026-03-13T12:40:48.811588768Z I0313 12:40:48.811524 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[flowcontrol.apiserver.k8s.io/v1/FlowSchema, namespace: , name: openshift-ovn-kubernetes, uid: c8d57f66-1364-48af-8838-c3943c77c40d]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"7e9152e6-38e3-4536-8603-a138d1af3fd0","controller":true,"blockOwnerDeletion":true}] 2026-03-13T12:40:55.631629881Z I0313 12:40:55.631534 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-8f89dfddd" duration="76.073µs" 2026-03-13T12:40:55.648568548Z I0313 12:40:55.648496 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-6fbfc8dc8f" duration="63.163µs" 2026-03-13T12:40:55.674804981Z I0313 12:40:55.674746 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-69576476f7" duration="83.344µs" 2026-03-13T12:40:55.692210771Z I0313 12:40:55.689653 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-5c5f6764b5" duration="46.422µs" 2026-03-13T12:40:55.704502196Z I0313 12:40:55.704263 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-55d85b7b47" duration="141.897µs" 2026-03-13T12:40:55.717938208Z I0313 12:40:55.717628 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/control-plane-machine-set-operator-6686554ddc" duration="68.284µs" 2026-03-13T12:40:55.736201251Z I0313 12:40:55.735870 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-664cb58b85" duration="52.282µs" 2026-03-13T12:40:55.750255734Z I0313 12:40:55.750179 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-fdb5c78b5" duration="97.895µs" 2026-03-13T12:40:55.767817033Z I0313 12:40:55.767736 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-84bf6db4f9" duration="57.193µs" 2026-03-13T12:40:55.786894988Z I0313 12:40:55.786833 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-5cdb4c5598" duration="58.763µs" 2026-03-13T12:40:58.073188569Z I0313 12:40:58.072310 1 replica_set.go:624] "Too many replicas" logger="replicaset-controller" replicaSet="openshift-cluster-machine-approver/machine-approver-955fcfb87" need=0 deleting=1 2026-03-13T12:40:58.073188569Z I0313 12:40:58.072352 1 replica_set.go:251] "Found related ReplicaSets" logger="replicaset-controller" replicaSet="openshift-cluster-machine-approver/machine-approver-955fcfb87" relatedReplicaSets=["openshift-cluster-machine-approver/machine-approver-955fcfb87"] 2026-03-13T12:40:58.073188569Z I0313 12:40:58.072421 1 controller_utils.go:608] "Deleting pod" logger="replicaset-controller" controller="machine-approver-955fcfb87" pod="openshift-cluster-machine-approver/machine-approver-955fcfb87-bffng" 2026-03-13T12:40:58.329008896Z I0313 12:40:58.328949 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cluster-machine-approver/machine-approver" err="Operation cannot be fulfilled on deployments.apps \"machine-approver\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T12:40:58.357528364Z I0313 12:40:58.357466 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-955fcfb87" duration="285.196608ms" 2026-03-13T12:40:58.382028288Z I0313 12:40:58.381288 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-955fcfb87" duration="23.771369ms" 2026-03-13T12:40:58.382028288Z I0313 12:40:58.381412 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-955fcfb87" duration="78.234µs" 2026-03-13T12:40:58.382028288Z I0313 12:40:58.381464 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-955fcfb87" duration="29.662µs" 2026-03-13T12:41:04.064367016Z I0313 12:41:04.064106 1 replica_set.go:624] "Too many replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" need=0 deleting=1 2026-03-13T12:41:04.064367016Z I0313 12:41:04.064298 1 replica_set.go:251] "Found related ReplicaSets" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" relatedReplicaSets=["openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945"] 2026-03-13T12:41:04.064443249Z I0313 12:41:04.064403 1 controller_utils.go:608] "Deleting pod" logger="replicaset-controller" controller="cluster-cloud-controller-manager-operator-559568b945" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945-9ccr9" 2026-03-13T12:41:04.152620698Z I0313 12:41:04.152544 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="88.575659ms" 2026-03-13T12:41:04.155837128Z I0313 12:41:04.155792 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T12:41:04.504637528Z I0313 12:41:04.504581 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="351.98118ms" 2026-03-13T12:41:04.504686630Z I0313 12:41:04.504662 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="45.581µs" 2026-03-13T12:41:04.504777902Z I0313 12:41:04.504760 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="42.991µs" 2026-03-13T12:41:15.343239968Z E0313 12:41:15.342271 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" logger="UnhandledError" 2026-03-13T12:41:15.380452773Z I0313 12:41:15.380344 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2026-03-13T12:41:25.198342097Z I0313 12:41:25.197676 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-55d85b7b47" duration="637.12602ms" 2026-03-13T12:41:25.198674755Z I0313 12:41:25.198531 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-55d85b7b47" duration="88.963µs" 2026-03-13T12:41:26.090927399Z I0313 12:41:26.090815 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-664cb58b85" duration="16.389477ms" 2026-03-13T12:41:26.090953030Z I0313 12:41:26.090926 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-664cb58b85" duration="58.121µs" 2026-03-13T12:41:26.122018371Z I0313 12:41:26.121854 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-fdb5c78b5" duration="9.849474ms" 2026-03-13T12:41:26.122018371Z I0313 12:41:26.121909 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-fdb5c78b5" duration="31.411µs" 2026-03-13T12:41:26.510648442Z I0313 12:41:26.510569 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-955fcfb87" duration="43.661µs" 2026-03-13T12:41:27.904790109Z I0313 12:41:27.904702 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-84bf6db4f9" duration="437.228478ms" 2026-03-13T12:41:27.904935873Z I0313 12:41:27.904855 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-84bf6db4f9" duration="38.101µs" 2026-03-13T12:41:28.955928289Z I0313 12:41:28.954689 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-5cdb4c5598" duration="752.586177ms" 2026-03-13T12:41:28.957016616Z I0313 12:41:28.956836 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-5cdb4c5598" duration="98.193µs" 2026-03-13T12:41:29.347058072Z I0313 12:41:29.346787 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-8f89dfddd" duration="12.84991ms" 2026-03-13T12:41:29.347058072Z I0313 12:41:29.346914 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-8f89dfddd" duration="72.582µs" 2026-03-13T12:41:29.415179892Z I0313 12:41:29.413819 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-69576476f7" duration="18.783376ms" 2026-03-13T12:41:29.415179892Z I0313 12:41:29.413875 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-69576476f7" duration="26.381µs" 2026-03-13T12:41:29.438363109Z I0313 12:41:29.438295 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-5c5f6764b5" duration="11.150037ms" 2026-03-13T12:41:29.438459771Z I0313 12:41:29.438434 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-5c5f6764b5" duration="69.842µs" 2026-03-13T12:41:29.500493071Z I0313 12:41:29.500438 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-6fbfc8dc8f" duration="13.188327ms" 2026-03-13T12:41:29.500665015Z I0313 12:41:29.500642 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-6fbfc8dc8f" duration="54.601µs" 2026-03-13T12:41:30.148809791Z I0313 12:41:30.143885 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/control-plane-machine-set-operator-6686554ddc" duration="156.395234ms" 2026-03-13T12:41:30.148809791Z I0313 12:41:30.144517 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/control-plane-machine-set-operator-6686554ddc" duration="105.062µs" 2026-03-13T12:41:30.256058229Z I0313 12:41:30.254931 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="66.181µs" 2026-03-13T12:41:30.277283757Z I0313 12:41:30.276938 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="55.481µs" 2026-03-13T12:41:30.285811353Z I0313 12:41:30.285698 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="53.281µs" 2026-03-13T12:41:30.332023844Z I0313 12:41:30.331925 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" need=1 creating=1 2026-03-13T12:41:30.379834946Z I0313 12:41:30.379343 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T12:41:30.387191443Z I0313 12:41:30.387036 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="55.159988ms" 2026-03-13T12:41:30.392719523Z I0313 12:41:30.392661 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-955fcfb87" duration="55.941µs" 2026-03-13T12:41:30.506644259Z I0313 12:41:30.506573 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T12:41:30.506908986Z I0313 12:41:30.506869 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-955fcfb87" duration="44.591µs" 2026-03-13T12:41:30.519583037Z I0313 12:41:30.519526 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="132.441096ms" 2026-03-13T12:41:30.519735671Z I0313 12:41:30.519705 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-955fcfb87" duration="23.761µs" 2026-03-13T12:41:30.533584822Z I0313 12:41:30.533510 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-cluster-machine-approver/machine-approver-754bdc9f9d" need=1 creating=1 2026-03-13T12:41:30.554257066Z I0313 12:41:30.554193 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="34.603247ms" 2026-03-13T12:41:30.554348108Z I0313 12:41:30.554325 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="75.161µs" 2026-03-13T12:41:30.563414087Z I0313 12:41:30.563344 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-754bdc9f9d" duration="29.855946ms" 2026-03-13T12:41:30.576610412Z I0313 12:41:30.576541 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="91.542µs" 2026-03-13T12:41:30.577268068Z I0313 12:41:30.577232 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cluster-machine-approver/machine-approver" err="Operation cannot be fulfilled on deployments.apps \"machine-approver\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T12:41:30.578339116Z I0313 12:41:30.578278 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-754bdc9f9d" duration="14.877717ms" 2026-03-13T12:41:30.578431328Z I0313 12:41:30.578407 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-754bdc9f9d" duration="98.772µs" 2026-03-13T12:41:30.611728972Z I0313 12:41:30.611653 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-754bdc9f9d" duration="36.571µs" 2026-03-13T12:41:37.486263573Z I0313 12:41:37.484477 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="629.43069ms" 2026-03-13T12:41:37.486263573Z I0313 12:41:37.484583 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="64.201µs" 2026-03-13T12:41:39.260296496Z I0313 12:41:39.260213 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-754bdc9f9d" duration="1.220036436s" 2026-03-13T12:41:39.260540922Z I0313 12:41:39.260492 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-754bdc9f9d" duration="66.142µs" 2026-03-13T12:41:45.424648047Z E0313 12:41:45.423529 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" logger="UnhandledError" 2026-03-13T12:41:45.432238849Z I0313 12:41:45.430213 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2026-03-13T12:41:46.703046990Z I0313 12:41:46.702947 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" need=1 creating=1 2026-03-13T12:41:46.729111240Z I0313 12:41:46.729047 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-machine-config-operator/machine-config-controller" err="Operation cannot be fulfilled on deployments.apps \"machine-config-controller\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T12:41:46.742315385Z I0313 12:41:46.742258 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="39.343417ms" 2026-03-13T12:41:46.757861009Z I0313 12:41:46.756635 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="14.320073ms" 2026-03-13T12:41:46.757861009Z I0313 12:41:46.756727 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="44.601µs" 2026-03-13T12:41:46.772258634Z I0313 12:41:46.771924 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="43.321µs" 2026-03-13T12:41:48.146196449Z I0313 12:41:48.145811 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="62.582µs" 2026-03-13T12:41:48.830293094Z I0313 12:41:48.829083 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-79f8cd6fdd" duration="59.952µs" 2026-03-13T12:41:48.830293094Z I0313 12:41:48.829268 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="42.601µs" 2026-03-13T12:41:48.833068164Z I0313 12:41:48.832470 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="59.301µs" 2026-03-13T12:41:48.858541510Z I0313 12:41:48.857934 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="52.931µs" 2026-03-13T12:41:48.858541510Z I0313 12:41:48.858169 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="60.221µs" 2026-03-13T12:41:48.862642164Z I0313 12:41:48.862584 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-79f8cd6fdd" duration="50.831µs" 2026-03-13T12:41:48.885593625Z I0313 12:41:48.885534 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="55.011µs" 2026-03-13T12:41:49.015311852Z I0313 12:41:49.015245 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="55.541µs" 2026-03-13T12:41:49.755195110Z I0313 12:41:49.754510 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="59.553289ms" 2026-03-13T12:41:49.755195110Z I0313 12:41:49.754574 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="27.681µs" 2026-03-13T12:41:49.788182517Z I0313 12:41:49.784804 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="43.841µs" 2026-03-13T12:41:49.841314733Z I0313 12:41:49.838274 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="84.242µs" 2026-03-13T12:41:50.640153646Z I0313 12:41:50.640018 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="9.797668ms" 2026-03-13T12:41:50.640201997Z I0313 12:41:50.640171 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="56.692µs" kube-controller-manager_previous.log0000640000000000000000000003173215155003025033764 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-13T12:38:49.946999245Z I0313 12:38:49.946987 1 flags.go:64] FLAG: --requestheader-allowed-names="[]" 2026-03-13T12:38:49.946999245Z I0313 12:38:49.946991 1 flags.go:64] FLAG: --requestheader-client-ca-file="" 2026-03-13T12:38:49.946999245Z I0313 12:38:49.946994 1 flags.go:64] FLAG: --requestheader-extra-headers-prefix="[x-remote-extra-]" 2026-03-13T12:38:49.947006806Z I0313 12:38:49.946997 1 flags.go:64] FLAG: --requestheader-group-headers="[x-remote-group]" 2026-03-13T12:38:49.947006806Z I0313 12:38:49.947002 1 flags.go:64] FLAG: --requestheader-username-headers="[x-remote-user]" 2026-03-13T12:38:49.947014926Z I0313 12:38:49.947005 1 flags.go:64] FLAG: --resource-quota-sync-period="5m0s" 2026-03-13T12:38:49.947014926Z I0313 12:38:49.947008 1 flags.go:64] FLAG: --root-ca-file="/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt" 2026-03-13T12:38:49.947014926Z I0313 12:38:49.947012 1 flags.go:64] FLAG: --route-reconciliation-period="10s" 2026-03-13T12:38:49.947022746Z I0313 12:38:49.947015 1 flags.go:64] FLAG: --secondary-node-eviction-rate="0.01" 2026-03-13T12:38:49.947022746Z I0313 12:38:49.947018 1 flags.go:64] FLAG: --secure-port="10257" 2026-03-13T12:38:49.947030126Z I0313 12:38:49.947022 1 flags.go:64] FLAG: --service-account-private-key-file="/etc/kubernetes/secrets/service-account.key" 2026-03-13T12:38:49.947030126Z I0313 12:38:49.947025 1 flags.go:64] FLAG: --service-cluster-ip-range="172.30.0.0/16" 2026-03-13T12:38:49.947037397Z I0313 12:38:49.947028 1 flags.go:64] FLAG: --show-hidden-metrics-for-version="" 2026-03-13T12:38:49.947037397Z I0313 12:38:49.947031 1 flags.go:64] FLAG: --terminated-pod-gc-threshold="12500" 2026-03-13T12:38:49.947037397Z I0313 12:38:49.947035 1 flags.go:64] FLAG: --tls-cert-file="" 2026-03-13T12:38:49.947045077Z I0313 12:38:49.947038 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2026-03-13T12:38:49.947045077Z I0313 12:38:49.947042 1 flags.go:64] FLAG: --tls-min-version="" 2026-03-13T12:38:49.947052437Z I0313 12:38:49.947045 1 flags.go:64] FLAG: --tls-private-key-file="" 2026-03-13T12:38:49.947052437Z I0313 12:38:49.947048 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2026-03-13T12:38:49.947059668Z I0313 12:38:49.947052 1 flags.go:64] FLAG: --unhealthy-zone-threshold="0.55" 2026-03-13T12:38:49.947059668Z I0313 12:38:49.947055 1 flags.go:64] FLAG: --unsupported-kube-api-over-localhost="false" 2026-03-13T12:38:49.947066918Z I0313 12:38:49.947058 1 flags.go:64] FLAG: --use-service-account-credentials="true" 2026-03-13T12:38:49.947066918Z I0313 12:38:49.947061 1 flags.go:64] FLAG: --v="2" 2026-03-13T12:38:49.947074418Z I0313 12:38:49.947066 1 flags.go:64] FLAG: --version="false" 2026-03-13T12:38:49.947074418Z I0313 12:38:49.947071 1 flags.go:64] FLAG: --vmodule="" 2026-03-13T12:38:49.947406680Z W0313 12:38:49.947383 1 feature_gate.go:353] Setting GA feature gate DisableKubeletCloudCredentialProviders=true. It will be removed in a future release. 2026-03-13T12:38:49.947527274Z W0313 12:38:49.947507 1 feature_gate.go:330] unrecognized feature gate: OnClusterBuild 2026-03-13T12:38:49.947527274Z W0313 12:38:49.947514 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDCWithUIDAndExtraClaimMappings 2026-03-13T12:38:49.947527274Z W0313 12:38:49.947517 1 feature_gate.go:330] unrecognized feature gate: MachineConfigNodes 2026-03-13T12:38:49.947527274Z W0313 12:38:49.947521 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImages 2026-03-13T12:38:49.947543575Z W0313 12:38:49.947530 1 feature_gate.go:330] unrecognized feature gate: GatewayAPI 2026-03-13T12:38:49.947543575Z W0313 12:38:49.947534 1 feature_gate.go:330] unrecognized feature gate: OpenShiftPodSecurityAdmission 2026-03-13T12:38:49.947543575Z W0313 12:38:49.947537 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAzure 2026-03-13T12:38:49.947543575Z W0313 12:38:49.947541 1 feature_gate.go:330] unrecognized feature gate: InsightsRuntimeExtractor 2026-03-13T12:38:49.947553095Z W0313 12:38:49.947545 1 feature_gate.go:353] Setting GA feature gate ValidatingAdmissionPolicy=true. It will be removed in a future release. 2026-03-13T12:38:49.947553095Z W0313 12:38:49.947549 1 feature_gate.go:330] unrecognized feature gate: ConsolePluginContentSecurityPolicy 2026-03-13T12:38:49.947567146Z W0313 12:38:49.947552 1 feature_gate.go:330] unrecognized feature gate: HardwareSpeed 2026-03-13T12:38:49.947567146Z W0313 12:38:49.947556 1 feature_gate.go:330] unrecognized feature gate: NodeDisruptionPolicy 2026-03-13T12:38:49.947567146Z W0313 12:38:49.947559 1 feature_gate.go:330] unrecognized feature gate: ChunkSizeMiB 2026-03-13T12:38:49.947567146Z W0313 12:38:49.947562 1 feature_gate.go:330] unrecognized feature gate: SigstoreImageVerification 2026-03-13T12:38:49.947579796Z W0313 12:38:49.947565 1 feature_gate.go:330] unrecognized feature gate: VolumeGroupSnapshot 2026-03-13T12:38:49.947579796Z W0313 12:38:49.947569 1 feature_gate.go:330] unrecognized feature gate: NewOLM 2026-03-13T12:38:49.947579796Z W0313 12:38:49.947576 1 feature_gate.go:330] unrecognized feature gate: EtcdBackendQuota 2026-03-13T12:38:49.947589666Z W0313 12:38:49.947579 1 feature_gate.go:330] unrecognized feature gate: UpgradeStatus 2026-03-13T12:38:49.947589666Z W0313 12:38:49.947582 1 feature_gate.go:330] unrecognized feature gate: NetworkLiveMigration 2026-03-13T12:38:49.947589666Z W0313 12:38:49.947586 1 feature_gate.go:330] unrecognized feature gate: AdditionalRoutingCapabilities 2026-03-13T12:38:49.947602887Z W0313 12:38:49.947589 1 feature_gate.go:330] unrecognized feature gate: VSphereDriverConfiguration 2026-03-13T12:38:49.947602887Z W0313 12:38:49.947593 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAWS 2026-03-13T12:38:49.947602887Z W0313 12:38:49.947596 1 feature_gate.go:330] unrecognized feature gate: AzureWorkloadIdentity 2026-03-13T12:38:49.947616477Z W0313 12:38:49.947601 1 feature_gate.go:330] unrecognized feature gate: MachineAPIProviderOpenStack 2026-03-13T12:38:49.947616477Z W0313 12:38:49.947604 1 feature_gate.go:330] unrecognized feature gate: PersistentIPsForVirtualization 2026-03-13T12:38:49.947616477Z W0313 12:38:49.947607 1 feature_gate.go:330] unrecognized feature gate: GCPLabelsTags 2026-03-13T12:38:49.947616477Z W0313 12:38:49.947610 1 feature_gate.go:330] unrecognized feature gate: OVNObservability 2026-03-13T12:38:49.947616477Z W0313 12:38:49.947613 1 feature_gate.go:330] unrecognized feature gate: InsightsConfig 2026-03-13T12:38:49.947627408Z W0313 12:38:49.947619 1 feature_gate.go:330] unrecognized feature gate: MinimumKubeletVersion 2026-03-13T12:38:49.947627408Z W0313 12:38:49.947623 1 feature_gate.go:330] unrecognized feature gate: BareMetalLoadBalancer 2026-03-13T12:38:49.947652209Z W0313 12:38:49.947626 1 feature_gate.go:330] unrecognized feature gate: InsightsOnDemandDataGather 2026-03-13T12:38:49.947652209Z W0313 12:38:49.947630 1 feature_gate.go:330] unrecognized feature gate: MachineAPIOperatorDisableMachineHealthCheckController 2026-03-13T12:38:49.947652209Z W0313 12:38:49.947633 1 feature_gate.go:330] unrecognized feature gate: InsightsConfigAPI 2026-03-13T12:38:49.947652209Z W0313 12:38:49.947636 1 feature_gate.go:330] unrecognized feature gate: MixedCPUsAllocation 2026-03-13T12:38:49.947652209Z W0313 12:38:49.947646 1 feature_gate.go:330] unrecognized feature gate: PinnedImages 2026-03-13T12:38:49.947671239Z W0313 12:38:49.947651 1 feature_gate.go:351] Setting deprecated feature gate KMSv1=true. It will be removed in a future release. 2026-03-13T12:38:49.947671239Z W0313 12:38:49.947655 1 feature_gate.go:330] unrecognized feature gate: VSphereControlPlaneMachineSet 2026-03-13T12:38:49.947671239Z W0313 12:38:49.947658 1 feature_gate.go:330] unrecognized feature gate: NutanixMultiSubnets 2026-03-13T12:38:49.947671239Z W0313 12:38:49.947661 1 feature_gate.go:330] unrecognized feature gate: RouteAdvertisements 2026-03-13T12:38:49.947671239Z W0313 12:38:49.947663 1 feature_gate.go:330] unrecognized feature gate: MetricsCollectionProfiles 2026-03-13T12:38:49.947680670Z W0313 12:38:49.947666 1 feature_gate.go:330] unrecognized feature gate: SignatureStores 2026-03-13T12:38:49.947680670Z W0313 12:38:49.947672 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstall 2026-03-13T12:38:49.947680670Z W0313 12:38:49.947675 1 feature_gate.go:330] unrecognized feature gate: ImageStreamImportMode 2026-03-13T12:38:49.947680670Z W0313 12:38:49.947678 1 feature_gate.go:330] unrecognized feature gate: MachineAPIMigration 2026-03-13T12:38:49.947690110Z W0313 12:38:49.947681 1 feature_gate.go:330] unrecognized feature gate: NetworkSegmentation 2026-03-13T12:38:49.947690110Z W0313 12:38:49.947684 1 feature_gate.go:330] unrecognized feature gate: IngressControllerLBSubnetsAWS 2026-03-13T12:38:49.947690110Z W0313 12:38:49.947687 1 feature_gate.go:330] unrecognized feature gate: SetEIPForNLBIngressController 2026-03-13T12:38:49.947704941Z W0313 12:38:49.947689 1 feature_gate.go:330] unrecognized feature gate: AlibabaPlatform 2026-03-13T12:38:49.947704941Z W0313 12:38:49.947692 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDC 2026-03-13T12:38:49.947704941Z W0313 12:38:49.947695 1 feature_gate.go:330] unrecognized feature gate: NetworkDiagnosticsConfig 2026-03-13T12:38:49.947704941Z W0313 12:38:49.947698 1 feature_gate.go:330] unrecognized feature gate: BootcNodeManagement 2026-03-13T12:38:49.947704941Z W0313 12:38:49.947701 1 feature_gate.go:330] unrecognized feature gate: CSIDriverSharedResource 2026-03-13T12:38:49.947718021Z W0313 12:38:49.947703 1 feature_gate.go:330] unrecognized feature gate: AWSEFSDriverVolumeMetrics 2026-03-13T12:38:49.947718021Z W0313 12:38:49.947707 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallGCP 2026-03-13T12:38:49.947718021Z W0313 12:38:49.947712 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstallIBMCloud 2026-03-13T12:38:49.947727961Z W0313 12:38:49.947720 1 feature_gate.go:353] Setting GA feature gate CloudDualStackNodeIPs=true. It will be removed in a future release. 2026-03-13T12:38:49.947727961Z W0313 12:38:49.947724 1 feature_gate.go:330] unrecognized feature gate: VSphereStaticIPs 2026-03-13T12:38:49.947736952Z W0313 12:38:49.947727 1 feature_gate.go:330] unrecognized feature gate: ClusterMonitoringConfig 2026-03-13T12:38:49.947736952Z W0313 12:38:49.947731 1 feature_gate.go:330] unrecognized feature gate: IngressControllerDynamicConfigurationManager 2026-03-13T12:38:49.947736952Z W0313 12:38:49.947733 1 feature_gate.go:330] unrecognized feature gate: DNSNameResolver 2026-03-13T12:38:49.947752682Z W0313 12:38:49.947736 1 feature_gate.go:330] unrecognized feature gate: AWSClusterHostedDNS 2026-03-13T12:38:49.947752682Z W0313 12:38:49.947739 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiNetworks 2026-03-13T12:38:49.947752682Z W0313 12:38:49.947742 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiVCenters 2026-03-13T12:38:49.947752682Z W0313 12:38:49.947745 1 feature_gate.go:330] unrecognized feature gate: BuildCSIVolumes 2026-03-13T12:38:49.947760873Z W0313 12:38:49.947748 1 feature_gate.go:330] unrecognized feature gate: AutomatedEtcdBackup 2026-03-13T12:38:49.947760873Z W0313 12:38:49.947754 1 feature_gate.go:330] unrecognized feature gate: Example 2026-03-13T12:38:49.947760873Z W0313 12:38:49.947757 1 feature_gate.go:330] unrecognized feature gate: AdminNetworkPolicy 2026-03-13T12:38:49.947768613Z W0313 12:38:49.947759 1 feature_gate.go:330] unrecognized feature gate: PrivateHostedZoneAWS 2026-03-13T12:38:49.947768613Z W0313 12:38:49.947762 1 feature_gate.go:330] unrecognized feature gate: PlatformOperators 2026-03-13T12:38:49.947768613Z W0313 12:38:49.947765 1 feature_gate.go:330] unrecognized feature gate: GCPClusterHostedDNS 2026-03-13T12:38:49.947776363Z W0313 12:38:49.947769 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImagesAWS 2026-03-13T12:38:50.224625720Z I0313 12:38:50.224561 1 serving.go:380] Generated self-signed cert (/var/run/kubernetes/kube-controller-manager.crt, /var/run/kubernetes/kube-controller-manager.key) 2026-03-13T12:38:50.226462337Z I0313 12:38:50.226432 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/kubernetes/kube-controller-manager.crt::/var/run/kubernetes/kube-controller-manager.key" 2026-03-13T12:39:50.463302060Z E0313 12:39:50.462921 1 run.go:72] "command failed" err="unable to load configmap based request-header-client-ca-file: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps extension-apiserver-authentication)" config/pod/kube-system/bootstrap-kube-controller-manager-master-0.json0000640000000000000000000002734715155003025024623 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-controller-manager-master-0","namespace":"kube-system","uid":"2a95cc19-9f56-4025-b4b6-9028c4c8497c","resourceVersion":"9138","creationTimestamp":"2026-03-13T12:36:30Z","labels":{"openshift.io/component":"controller-manager","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"f78c05e1499b533b83f091333d61f045","kubernetes.io/config.mirror":"f78c05e1499b533b83f091333d61f045","kubernetes.io/config.seen":"2026-03-13T12:34:54.823778934Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"c456d6c3-a916-4f05-9928-7e43433a4d22","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"etc-kubernetes-cloud","hostPath":{"path":"/etc/kubernetes/cloud","type":""}},{"name":"config","hostPath":{"path":"/etc/kubernetes/bootstrap-configs","type":""}},{"name":"ssl-certs-host","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["hyperkube","kube-controller-manager"],"args":["--openshift-config=/etc/kubernetes/config/kube-controller-manager-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2","--allocate-node-cidrs=false","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--cert-dir=/var/run/kubernetes","--cloud-provider=external","--cluster-cidr=10.128.0.0/16","--cluster-signing-cert-file=/etc/kubernetes/secrets/kubelet-signer.crt","--cluster-signing-duration=720h","--cluster-signing-key-file=/etc/kubernetes/secrets/kubelet-signer.key","--controllers=*","--controllers=-bootstrapsigner","--controllers=-tokencleaner","--controllers=-ttl","--enable-dynamic-provisioning=true","--feature-gates=AWSClusterHostedDNS=false","--feature-gates=AWSEFSDriverVolumeMetrics=true","--feature-gates=AdditionalRoutingCapabilities=false","--feature-gates=AdminNetworkPolicy=true","--feature-gates=AlibabaPlatform=true","--feature-gates=AutomatedEtcdBackup=false","--feature-gates=AzureWorkloadIdentity=true","--feature-gates=BareMetalLoadBalancer=true","--feature-gates=BootcNodeManagement=false","--feature-gates=BuildCSIVolumes=true","--feature-gates=CSIDriverSharedResource=false","--feature-gates=ChunkSizeMiB=true","--feature-gates=CloudDualStackNodeIPs=true","--feature-gates=ClusterAPIInstall=false","--feature-gates=ClusterAPIInstallIBMCloud=false","--feature-gates=ClusterMonitoringConfig=false","--feature-gates=ConsolePluginContentSecurityPolicy=false","--feature-gates=DNSNameResolver=false","--feature-gates=DisableKubeletCloudCredentialProviders=true","--feature-gates=DynamicResourceAllocation=false","--feature-gates=EtcdBackendQuota=false","--feature-gates=EventedPLEG=false","--feature-gates=Example=false","--feature-gates=ExternalOIDC=false","--feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false","--feature-gates=GCPClusterHostedDNS=false","--feature-gates=GCPLabelsTags=true","--feature-gates=GatewayAPI=false","--feature-gates=HardwareSpeed=true","--feature-gates=ImageStreamImportMode=false","--feature-gates=IngressControllerDynamicConfigurationManager=false","--feature-gates=IngressControllerLBSubnetsAWS=true","--feature-gates=InsightsConfig=false","--feature-gates=InsightsConfigAPI=false","--feature-gates=InsightsOnDemandDataGather=false","--feature-gates=InsightsRuntimeExtractor=false","--feature-gates=KMSv1=true","--feature-gates=MachineAPIMigration=false","--feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false","--feature-gates=MachineAPIProviderOpenStack=false","--feature-gates=MachineConfigNodes=false","--feature-gates=ManagedBootImages=true","--feature-gates=ManagedBootImagesAWS=true","--feature-gates=MaxUnavailableStatefulSet=false","--feature-gates=MetricsCollectionProfiles=false","--feature-gates=MinimumKubeletVersion=false","--feature-gates=MixedCPUsAllocation=false","--feature-gates=MultiArchInstallAWS=true","--feature-gates=MultiArchInstallAzure=false","--feature-gates=MultiArchInstallGCP=true","--feature-gates=NetworkDiagnosticsConfig=true","--feature-gates=NetworkLiveMigration=true","--feature-gates=NetworkSegmentation=true","--feature-gates=NewOLM=true","--feature-gates=NodeDisruptionPolicy=true","--feature-gates=NodeSwap=false","--feature-gates=NutanixMultiSubnets=false","--feature-gates=OVNObservability=false","--feature-gates=OnClusterBuild=true","--feature-gates=OpenShiftPodSecurityAdmission=false","--feature-gates=PersistentIPsForVirtualization=true","--feature-gates=PinnedImages=false","--feature-gates=PlatformOperators=false","--feature-gates=PrivateHostedZoneAWS=true","--feature-gates=ProcMountType=false","--feature-gates=RouteAdvertisements=false","--feature-gates=RouteExternalCertificate=false","--feature-gates=ServiceAccountTokenNodeBinding=false","--feature-gates=SetEIPForNLBIngressController=true","--feature-gates=SignatureStores=false","--feature-gates=SigstoreImageVerification=false","--feature-gates=StreamingCollectionEncodingToJSON=true","--feature-gates=StreamingCollectionEncodingToProtobuf=true","--feature-gates=TranslateStreamCloseWebsocketRequests=false","--feature-gates=UpgradeStatus=false","--feature-gates=UserNamespacesPodSecurityStandards=false","--feature-gates=UserNamespacesSupport=false","--feature-gates=VSphereControlPlaneMachineSet=true","--feature-gates=VSphereDriverConfiguration=true","--feature-gates=VSphereMultiNetworks=false","--feature-gates=VSphereMultiVCenters=true","--feature-gates=VSphereStaticIPs=true","--feature-gates=ValidatingAdmissionPolicy=true","--feature-gates=VolumeAttributesClass=false","--feature-gates=VolumeGroupSnapshot=false","--flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec","--kube-api-burst=300","--kube-api-qps=150","--leader-elect-renew-deadline=12s","--leader-elect-resource-lock=leases","--leader-elect-retry-period=3s","--leader-elect=true","--pv-recycler-pod-template-filepath-hostpath=","--pv-recycler-pod-template-filepath-nfs=","--root-ca-file=/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt","--secure-port=10257","--service-account-private-key-file=/etc/kubernetes/secrets/service-account.key","--service-cluster-ip-range=172.30.0.0/16","--use-service-account-credentials=true"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","command":["cluster-policy-controller","start"],"args":["--config=/etc/kubernetes/config/cluster-policy-controller-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--namespace=$(POD_NAMESPACE)","--v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:25Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:25Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:25Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T12:37:25Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2026-03-13T12:35:07Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","containerID":"cri-o://982c1c225b535e0fa3c9e5b01c4c3960b52c601ea135812c4af51bc13c9b4e1a","started":true},{"name":"kube-controller-manager","state":{"running":{"startedAt":"2026-03-13T12:40:14Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-03-13T12:38:49Z","finishedAt":"2026-03-13T12:39:50Z","containerID":"cri-o://696192325e102818ab8863a16ab52b3671d6dc3f225d1e0faf06a32633060bda"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","containerID":"cri-o://c81c73f91c343cb4e577286cc40722c4e25a55cd8b94b5a421c1eff5fabb3c61","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000001020415155003025044445 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-86d7cdfdfb-br96g2026-03-13T12:40:14.160250417Z I0313 12:40:14.160080 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T12:40:14.160467761Z I0313 12:40:14.160432 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T12:40:14.161072914Z I0313 12:40:14.161035 1 observer_polling.go:159] Starting file observer 2026-03-13T12:40:27.162511427Z I0313 12:40:27.162447 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602162248.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-13T12:40:27.615232165Z I0313 12:40:27.613907 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T12:40:27.615232165Z W0313 12:40:27.613935 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T12:40:27.615232165Z W0313 12:40:27.613941 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T12:40:27.615232165Z W0313 12:40:27.613944 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T12:40:27.615232165Z W0313 12:40:27.613947 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T12:40:27.615232165Z W0313 12:40:27.613950 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T12:40:27.615232165Z W0313 12:40:27.613952 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T12:40:27.621678797Z I0313 12:40:27.621431 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T12:40:27.625162392Z I0313 12:40:27.621755 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... 2026-03-13T12:40:27.625162392Z I0313 12:40:27.622179 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T12:40:27.625162392Z I0313 12:40:27.622205 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T12:40:27.625162392Z I0313 12:40:27.622250 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T12:40:27.625162392Z I0313 12:40:27.622261 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T12:40:27.625162392Z I0313 12:40:27.622273 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T12:40:27.625162392Z I0313 12:40:27.622293 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T12:40:27.625162392Z I0313 12:40:27.622381 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T12:40:27.625162392Z I0313 12:40:27.622426 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T12:40:27.625162392Z I0313 12:40:27.622560 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T12:40:27.723184535Z I0313 12:40:27.722889 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T12:40:27.723184535Z I0313 12:40:27.722975 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T12:40:27.723184535Z I0313 12:40:27.723068 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-controller-manager-operator_previous.log0000640000000000000000000004205515155003025044650 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-86d7cdfdfb-br96g2026-03-13T12:38:44.448777372Z I0313 12:38:44.448754 1 leaderelection.go:297] failed to renew lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock: timed out waiting for the condition 2026-03-13T12:38:44.448895666Z I0313 12:38:44.448848 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-13T12:38:44.448967729Z I0313 12:38:44.448929 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-13T12:38:44.449002490Z I0313 12:38:44.448949 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-13T12:38:44.449051292Z I0313 12:38:44.449031 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-13T12:38:44.449051292Z I0313 12:38:44.449030 1 base_controller.go:181] Shutting down kube-controller-manager-InstallerState ... 2026-03-13T12:38:44.449062742Z I0313 12:38:44.449042 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-controller-manager controller ... 2026-03-13T12:38:44.449071452Z I0313 12:38:44.449039 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-13T12:38:44.449080443Z I0313 12:38:44.449071 1 base_controller.go:181] Shutting down GarbageCollectorWatcherController ... 2026-03-13T12:38:44.449080443Z I0313 12:38:44.449048 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T12:38:44.449088833Z I0313 12:38:44.449083 1 base_controller.go:123] Shutting down worker of GarbageCollectorWatcherController controller ... 2026-03-13T12:38:44.449096983Z I0313 12:38:44.449089 1 base_controller.go:113] All GarbageCollectorWatcherController workers have been terminated 2026-03-13T12:38:44.449125494Z I0313 12:38:44.449107 1 base_controller.go:181] Shutting down SATokenSignerController ... 2026-03-13T12:38:44.449181726Z E0313 12:38:44.449163 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": context canceled" 2026-03-13T12:38:44.449197327Z I0313 12:38:44.449072 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-13T12:38:44.449207197Z I0313 12:38:44.449009 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-13T12:38:44.449207197Z I0313 12:38:44.449193 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T12:38:44.449240938Z I0313 12:38:44.449216 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T12:38:44.449252739Z I0313 12:38:44.449237 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-13T12:38:44.449288530Z I0313 12:38:44.448990 1 base_controller.go:181] Shutting down PruneController ... 2026-03-13T12:38:44.449327211Z I0313 12:38:44.449299 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T12:38:44.449340022Z I0313 12:38:44.449240 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T12:38:44.449367443Z I0313 12:38:44.449222 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-13T12:38:44.449419225Z I0313 12:38:44.449398 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-13T12:38:44.449419225Z I0313 12:38:44.449408 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-13T12:38:44.449427635Z I0313 12:38:44.449415 1 base_controller.go:123] Shutting down worker of kube-controller-manager-Node controller ... 2026-03-13T12:38:44.449434515Z I0313 12:38:44.448980 1 base_controller.go:181] Shutting down StatusSyncer_kube-controller-manager ... 2026-03-13T12:38:44.449434515Z I0313 12:38:44.448972 1 base_controller.go:181] Shutting down kube-controller-manager-operator-UnsupportedConfigOverrides ... 2026-03-13T12:38:44.449442015Z I0313 12:38:44.449434 1 base_controller.go:159] All StatusSyncer_kube-controller-manager post start hooks have been terminated 2026-03-13T12:38:44.449448656Z I0313 12:38:44.449278 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-13T12:38:44.449448656Z I0313 12:38:44.449288 1 base_controller.go:181] Shutting down kube-controller-manager-Node ... 2026-03-13T12:38:44.449474757Z I0313 12:38:44.449461 1 base_controller.go:113] All kube-controller-manager-Node workers have been terminated 2026-03-13T12:38:44.449484597Z I0313 12:38:44.449472 1 base_controller.go:181] Shutting down kube-controller-manager ... 2026-03-13T12:38:44.449484597Z I0313 12:38:44.449474 1 controller_manager.go:54] kube-controller-manager-Node controller terminated 2026-03-13T12:38:44.449498577Z I0313 12:38:44.449317 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-13T12:38:44.449498577Z I0313 12:38:44.449348 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-13T12:38:44.449511278Z I0313 12:38:44.449504 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-13T12:38:44.449541819Z I0313 12:38:44.449515 1 base_controller.go:123] Shutting down worker of kube-controller-manager controller ... 2026-03-13T12:38:44.449541819Z I0313 12:38:44.449536 1 base_controller.go:181] Shutting down WorkerLatencyProfile ... 2026-03-13T12:38:44.449549959Z I0313 12:38:44.449545 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-13T12:38:44.449556590Z I0313 12:38:44.449552 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-13T12:38:44.449577010Z I0313 12:38:44.449562 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-13T12:38:44.449577010Z I0313 12:38:44.449184 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-13T12:38:44.449584561Z I0313 12:38:44.449574 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T12:38:44.449591191Z I0313 12:38:44.449582 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-13T12:38:44.449591191Z I0313 12:38:44.449588 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-13T12:38:44.449636172Z I0313 12:38:44.449599 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T12:38:44.449636172Z I0313 12:38:44.449523 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-13T12:38:44.449636172Z I0313 12:38:44.449623 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T12:38:44.449636172Z I0313 12:38:44.449443 1 base_controller.go:113] All StatusSyncer_kube-controller-manager workers have been terminated 2026-03-13T12:38:44.449658493Z I0313 12:38:44.449132 1 base_controller.go:123] Shutting down worker of kube-controller-manager-operator-UnsupportedConfigOverrides controller ... 2026-03-13T12:38:44.449658493Z I0313 12:38:44.449653 1 base_controller.go:113] All kube-controller-manager-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-13T12:38:44.449669484Z I0313 12:38:44.449663 1 base_controller.go:181] Shutting down Installer ... 2026-03-13T12:38:44.449677794Z I0313 12:38:44.449563 1 base_controller.go:113] All kube-controller-manager workers have been terminated 2026-03-13T12:38:44.449677794Z I0313 12:38:44.449663 1 controller_manager.go:54] kube-controller-manager-operator-UnsupportedConfigOverrides controller terminated 2026-03-13T12:38:44.449688024Z I0313 12:38:44.449683 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-13T12:38:44.449698035Z I0313 12:38:44.449689 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-13T12:38:44.449742826Z I0313 12:38:44.449722 1 builder.go:335] server exited 2026-03-13T12:38:44.449742826Z I0313 12:38:44.449299 1 base_controller.go:181] Shutting down GuardController ... 2026-03-13T12:38:44.449751696Z I0313 12:38:44.449742 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-13T12:38:44.449758777Z I0313 12:38:44.449751 1 controller_manager.go:54] GuardController controller terminated 2026-03-13T12:38:44.449788559Z I0313 12:38:44.449770 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-13T12:38:44.449796319Z I0313 12:38:44.449788 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-13T12:38:44.449804799Z I0313 12:38:44.449798 1 controller_manager.go:54] PruneController controller terminated 2026-03-13T12:38:44.450111680Z E0313 12:38:44.450082 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-13T12:38:44.450139401Z I0313 12:38:44.450089 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-3830386569/tls.crt::/tmp/serving-cert-3830386569/tls.key" 2026-03-13T12:38:44.450267176Z I0313 12:38:44.450222 1 base_controller.go:123] Shutting down worker of kube-controller-manager-InstallerState controller ... 2026-03-13T12:38:44.450267176Z I0313 12:38:44.450235 1 base_controller.go:113] All kube-controller-manager-InstallerState workers have been terminated 2026-03-13T12:38:44.450267176Z I0313 12:38:44.450241 1 controller_manager.go:54] kube-controller-manager-InstallerState controller terminated 2026-03-13T12:38:44.450979701Z W0313 12:38:44.450932 1 base_controller.go:242] Updating status of "RevisionController" failed: unable to ApplyStatus for operator using fieldManager "RevisionController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-13T12:38:44.450979701Z E0313 12:38:44.450974 1 base_controller.go:279] "Unhandled Error" err="RevisionController reconciliation failed: Put \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/configmaps/revision-status-2\": context canceled" 2026-03-13T12:38:44.451652066Z I0313 12:38:44.451610 1 base_controller.go:123] Shutting down worker of SATokenSignerController controller ... 2026-03-13T12:38:44.451652066Z I0313 12:38:44.451627 1 base_controller.go:113] All SATokenSignerController workers have been terminated 2026-03-13T12:38:44.451671837Z E0313 12:38:44.451646 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T12:38:44.452453705Z I0313 12:38:44.452434 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-13T12:38:44.452490546Z I0313 12:38:44.452480 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-13T12:38:44.452514857Z I0313 12:38:44.452506 1 controller_manager.go:54] RevisionController controller terminated 2026-03-13T12:38:44.452597271Z E0313 12:38:44.452569 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-13T12:38:44.452822509Z I0313 12:38:44.452783 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-13T12:38:44.452822509Z I0313 12:38:44.452805 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-13T12:38:44.452837740Z I0313 12:38:44.452819 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-13T12:38:44.453138780Z E0313 12:38:44.453098 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-controller-manager/localhost-recovery-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/serviceaccounts/localhost-recovery-client\": context canceled, \"assets/kube-controller-manager/csr_approver_clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T12:38:44.453678100Z I0313 12:38:44.453634 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-13T12:38:44.453678100Z I0313 12:38:44.453671 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-13T12:38:44.454120326Z W0313 12:38:44.454068 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-13T12:38:44.454129847Z W0313 12:38:44.454108 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-13T12:38:44.454157458Z W0313 12:38:44.454127 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-13T12:38:44.454507010Z E0313 12:38:44.454456 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-13T12:38:44.454568192Z I0313 12:38:44.454536 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-13T12:38:44.454590833Z I0313 12:38:44.454573 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-13T12:38:44.455096171Z E0313 12:38:44.455046 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-13T12:38:44.456494142Z I0313 12:38:44.456175 1 base_controller.go:123] Shutting down worker of kube-controller-manager-StaticPodState controller ... 2026-03-13T12:38:44.456494142Z I0313 12:38:44.456190 1 base_controller.go:113] All kube-controller-manager-StaticPodState workers have been terminated 2026-03-13T12:38:44.456494142Z I0313 12:38:44.456197 1 controller_manager.go:54] kube-controller-manager-StaticPodState controller terminated 2026-03-13T12:38:44.456494142Z I0313 12:38:44.456230 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-13T12:38:44.456494142Z I0313 12:38:44.456248 1 base_controller.go:113] All Installer workers have been terminated 2026-03-13T12:38:44.456494142Z I0313 12:38:44.456262 1 controller_manager.go:54] Installer controller terminated 2026-03-13T12:38:49.447971821Z I0313 12:38:49.447923 1 observer_polling.go:162] Shutting down file observer 2026-03-13T12:39:18.454494767Z E0313 12:39:18.454232 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T12:39:18.454634930Z W0313 12:39:18.454582 1 leaderelection.go:84] leader election lost kube-controller-manager-operator-86d7cdfdfb-br96g.json0000640000000000000000000001450315155003025033565 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-86d7cdfdfb-br96g","generateName":"kube-controller-manager-operator-86d7cdfdfb-","namespace":"openshift-kube-controller-manager-operator","uid":"77ef7e49-eb85-4f5e-94d3-a6a8619a6243","resourceVersion":"9140","creationTimestamp":"2026-03-13T12:35:29Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"86d7cdfdfb"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.9/23\"],\"mac_address\":\"0a:58:0a:80:00:09\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.9/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.9\"\n ],\n \"mac\": \"0a:58:0a:80:00:09\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-86d7cdfdfb","uid":"cfb9cdaa-5546-4c5f-b8e4-daa3743dc6b9","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:35768a0c3eb24134dd38633e8acfc7db69ee96b2fd660e9bba3b8c996452fef7"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:26Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.9","podIPs":[{"ip":"10.128.0.9"}],"startTime":"2026-03-13T12:37:21Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-03-13T12:40:14Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T12:37:39Z","finishedAt":"2026-03-13T12:39:18Z","containerID":"cri-o://3add725e66228351c75651bb4a7357a39de488d2f8d517621841a317712aba3a"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","containerID":"cri-o://7889aaca2c1700074c08311c90db5e3d58c4df89e1b20e40fd33b13131a20557","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-controller-manager/logs/installer-1-master-0/installer_current.log0000640000000000000000000001443515155003025030775 0ustar00000000000000002026-03-13T12:38:23.850940330Z I0313 12:38:23.849750 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc000abe0a0 cert-dir:0xc000abe280 cert-secrets:0xc000abe000 configmaps:0xc000977ae0 namespace:0xc000977900 optional-cert-configmaps:0xc000abe1e0 optional-configmaps:0xc000977c20 optional-secrets:0xc000977b80 pod:0xc0009779a0 pod-manifest-dir:0xc000977d60 resource-dir:0xc000977cc0 revision:0xc000977860 secrets:0xc000977a40 v:0xc000abec80] [0xc000abec80 0xc000977860 0xc000977900 0xc0009779a0 0xc000977cc0 0xc000977d60 0xc000977ae0 0xc000977c20 0xc000977a40 0xc000977b80 0xc000abe280 0xc000abe0a0 0xc000abe1e0 0xc000abe000] [] map[cert-configmaps:0xc000abe0a0 cert-dir:0xc000abe280 cert-secrets:0xc000abe000 configmaps:0xc000977ae0 help:0xc000abf040 kubeconfig:0xc0009777c0 log-flush-frequency:0xc000abebe0 namespace:0xc000977900 optional-cert-configmaps:0xc000abe1e0 optional-cert-secrets:0xc000abe140 optional-configmaps:0xc000977c20 optional-secrets:0xc000977b80 pod:0xc0009779a0 pod-manifest-dir:0xc000977d60 pod-manifests-lock-file:0xc000977ea0 resource-dir:0xc000977cc0 revision:0xc000977860 secrets:0xc000977a40 timeout-duration:0xc000977e00 v:0xc000abec80 vmodule:0xc000abed20] [0xc0009777c0 0xc000977860 0xc000977900 0xc0009779a0 0xc000977a40 0xc000977ae0 0xc000977b80 0xc000977c20 0xc000977cc0 0xc000977d60 0xc000977e00 0xc000977ea0 0xc000abe000 0xc000abe0a0 0xc000abe140 0xc000abe1e0 0xc000abe280 0xc000abebe0 0xc000abec80 0xc000abed20 0xc000abf040] [0xc000abe0a0 0xc000abe280 0xc000abe000 0xc000977ae0 0xc000abf040 0xc0009777c0 0xc000abebe0 0xc000977900 0xc000abe1e0 0xc000abe140 0xc000977c20 0xc000977b80 0xc0009779a0 0xc000977d60 0xc000977ea0 0xc000977cc0 0xc000977860 0xc000977a40 0xc000977e00 0xc000abec80 0xc000abed20] map[104:0xc000abf040 118:0xc000abec80] [] -1 0 0xc000907a10 true 0x77b900 []} 2026-03-13T12:38:23.850940330Z I0313 12:38:23.850026 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0008584e0)({ 2026-03-13T12:38:23.850940330Z KubeConfig: (string) "", 2026-03-13T12:38:23.850940330Z KubeClient: (kubernetes.Interface) , 2026-03-13T12:38:23.850940330Z Revision: (string) (len=1) "1", 2026-03-13T12:38:23.850940330Z NodeName: (string) "", 2026-03-13T12:38:23.850940330Z Namespace: (string) (len=33) "openshift-kube-controller-manager", 2026-03-13T12:38:23.850940330Z Clock: (clock.RealClock) { 2026-03-13T12:38:23.850940330Z }, 2026-03-13T12:38:23.850940330Z PodConfigMapNamePrefix: (string) (len=27) "kube-controller-manager-pod", 2026-03-13T12:38:23.850940330Z SecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-13T12:38:23.850940330Z (string) (len=27) "service-account-private-key", 2026-03-13T12:38:23.850940330Z (string) (len=31) "localhost-recovery-client-token" 2026-03-13T12:38:23.850940330Z }, 2026-03-13T12:38:23.850940330Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T12:38:23.850940330Z (string) (len=12) "serving-cert" 2026-03-13T12:38:23.850940330Z }, 2026-03-13T12:38:23.850940330Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-13T12:38:23.850940330Z (string) (len=27) "kube-controller-manager-pod", 2026-03-13T12:38:23.850940330Z (string) (len=6) "config", 2026-03-13T12:38:23.850940330Z (string) (len=32) "cluster-policy-controller-config", 2026-03-13T12:38:23.850940330Z (string) (len=29) "controller-manager-kubeconfig", 2026-03-13T12:38:23.850940330Z (string) (len=38) "kube-controller-cert-syncer-kubeconfig", 2026-03-13T12:38:23.850940330Z (string) (len=17) "serviceaccount-ca", 2026-03-13T12:38:23.850940330Z (string) (len=10) "service-ca", 2026-03-13T12:38:23.850940330Z (string) (len=15) "recycler-config" 2026-03-13T12:38:23.850940330Z }, 2026-03-13T12:38:23.850940330Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T12:38:23.850940330Z (string) (len=12) "cloud-config" 2026-03-13T12:38:23.850940330Z }, 2026-03-13T12:38:23.850940330Z CertSecretNames: ([]string) (len=2 cap=2) { 2026-03-13T12:38:23.850940330Z (string) (len=39) "kube-controller-manager-client-cert-key", 2026-03-13T12:38:23.850940330Z (string) (len=10) "csr-signer" 2026-03-13T12:38:23.850940330Z }, 2026-03-13T12:38:23.850940330Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-13T12:38:23.850940330Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-13T12:38:23.850940330Z (string) (len=20) "aggregator-client-ca", 2026-03-13T12:38:23.850940330Z (string) (len=9) "client-ca" 2026-03-13T12:38:23.850940330Z }, 2026-03-13T12:38:23.850940330Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T12:38:23.850940330Z (string) (len=17) "trusted-ca-bundle" 2026-03-13T12:38:23.850940330Z }, 2026-03-13T12:38:23.850940330Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-13T12:38:23.850940330Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-13T12:38:23.850940330Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-13T12:38:23.850940330Z Timeout: (time.Duration) 2m0s, 2026-03-13T12:38:23.850940330Z StaticPodManifestsLockFile: (string) "", 2026-03-13T12:38:23.850940330Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-13T12:38:23.850940330Z KubeletVersion: (string) "" 2026-03-13T12:38:23.850940330Z }) 2026-03-13T12:38:23.853427690Z I0313 12:38:23.852428 1 cmd.go:413] Getting controller reference for node master-0 2026-03-13T12:38:23.871650034Z I0313 12:38:23.871177 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-13T12:38:23.871650034Z I0313 12:38:23.871311 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T12:38:23.871650034Z I0313 12:38:23.871326 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T12:38:23.875429721Z I0313 12:38:23.874752 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-13T12:38:53.875696781Z I0313 12:38:53.875497 1 cmd.go:524] Getting installer pods for node master-0 2026-03-13T12:39:07.880007916Z F0313 12:39:07.879731 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-controller-manager/installer-1-master-0.json0000640000000000000000000001716115155003025024461 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-controller-manager","uid":"3828446d-a3e3-412f-a0e7-7347b5de523a","resourceVersion":"9148","creationTimestamp":"2026-03-13T12:38:21Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.48/23\"],\"mac_address\":\"0a:58:0a:80:00:30\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.48/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.48\"\n ],\n \"mac\": \"0a:58:0a:80:00:30\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"f232ac68-8ffe-4e48-a868-f4eb3b92a386"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["cluster-kube-controller-manager-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-controller-manager","--pod=kube-controller-manager-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-controller-manager-pod","--configmaps=config","--configmaps=cluster-policy-controller-config","--configmaps=controller-manager-kubeconfig","--optional-configmaps=cloud-config","--configmaps=kube-controller-cert-syncer-kubeconfig","--configmaps=serviceaccount-ca","--configmaps=service-ca","--configmaps=recycler-config","--secrets=service-account-private-key","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-controller-manager-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-secrets=kube-controller-manager-client-cert-key","--cert-secrets=csr-signer"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:14Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:21Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:13Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:13Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:21Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.48","podIPs":[{"ip":"10.128.0.48"}],"startTime":"2026-03-13T12:38:21Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"icy-controller-config\",\n (string) (len=29) \"controller-manager-kubeconfig\",\n (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=10) \"service-ca\",\n (string) (len=15) \"recycler-config\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=12) \"cloud-config\"\n },\n CertSecretNames: ([]string) (len=2 cap=2) {\n (string) (len=39) \"kube-controller-manager-client-cert-key\",\n (string) (len=10) \"csr-signer\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0313 12:38:23.852428 1 cmd.go:413] Getting controller reference for node master-0\nI0313 12:38:23.871177 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0313 12:38:23.871311 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0313 12:38:23.871326 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0313 12:38:23.874752 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0313 12:38:53.875497 1 cmd.go:524] Getting installer pods for node master-0\nF0313 12:39:07.879731 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-13T12:38:22Z","finishedAt":"2026-03-13T12:39:08Z","containerID":"cri-o://aa6c714b8707274c998afed0944ecc8600d7bc24a6b08415b6cbef112b436b47"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","containerID":"cri-o://aa6c714b8707274c998afed0944ecc8600d7bc24a6b08415b6cbef112b436b47","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715155003025027177 0ustar00000000000000002026-03-13T12:38:23.349284420Z I0313 12:38:23.347876 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc0008f99a0 cert-dir:0xc0008f9b80 cert-secrets:0xc0008f9900 configmaps:0xc0008f94a0 namespace:0xc0008f92c0 optional-cert-configmaps:0xc0008f9ae0 optional-cert-secrets:0xc0008f9a40 optional-configmaps:0xc0008f95e0 optional-secrets:0xc0008f9540 pod:0xc0008f9360 pod-manifest-dir:0xc0008f9720 resource-dir:0xc0008f9680 revision:0xc0008f9220 secrets:0xc0008f9400 v:0xc0008b0c80] [0xc0008b0c80 0xc0008f9220 0xc0008f92c0 0xc0008f9360 0xc0008f9680 0xc0008f9720 0xc0008f94a0 0xc0008f95e0 0xc0008f9400 0xc0008f9540 0xc0008f9b80 0xc0008f99a0 0xc0008f9ae0 0xc0008f9900 0xc0008f9a40] [] map[cert-configmaps:0xc0008f99a0 cert-dir:0xc0008f9b80 cert-secrets:0xc0008f9900 configmaps:0xc0008f94a0 help:0xc0008b1040 kubeconfig:0xc0008f9180 log-flush-frequency:0xc0008b0be0 namespace:0xc0008f92c0 optional-cert-configmaps:0xc0008f9ae0 optional-cert-secrets:0xc0008f9a40 optional-configmaps:0xc0008f95e0 optional-secrets:0xc0008f9540 pod:0xc0008f9360 pod-manifest-dir:0xc0008f9720 pod-manifests-lock-file:0xc0008f9860 resource-dir:0xc0008f9680 revision:0xc0008f9220 secrets:0xc0008f9400 timeout-duration:0xc0008f97c0 v:0xc0008b0c80 vmodule:0xc0008b0d20] [0xc0008f9180 0xc0008f9220 0xc0008f92c0 0xc0008f9360 0xc0008f9400 0xc0008f94a0 0xc0008f9540 0xc0008f95e0 0xc0008f9680 0xc0008f9720 0xc0008f97c0 0xc0008f9860 0xc0008f9900 0xc0008f99a0 0xc0008f9a40 0xc0008f9ae0 0xc0008f9b80 0xc0008b0be0 0xc0008b0c80 0xc0008b0d20 0xc0008b1040] [0xc0008f99a0 0xc0008f9b80 0xc0008f9900 0xc0008f94a0 0xc0008b1040 0xc0008f9180 0xc0008b0be0 0xc0008f92c0 0xc0008f9ae0 0xc0008f9a40 0xc0008f95e0 0xc0008f9540 0xc0008f9360 0xc0008f9720 0xc0008f9860 0xc0008f9680 0xc0008f9220 0xc0008f9400 0xc0008f97c0 0xc0008b0c80 0xc0008b0d20] map[104:0xc0008b1040 118:0xc0008b0c80] [] -1 0 0xc0008e9590 true 0xae2020 []} 2026-03-13T12:38:23.349284420Z I0313 12:38:23.348243 1 cmd.go:96] (*installerpod.InstallOptions)(0xc00087a680)({ 2026-03-13T12:38:23.349284420Z KubeConfig: (string) "", 2026-03-13T12:38:23.349284420Z KubeClient: (kubernetes.Interface) , 2026-03-13T12:38:23.349284420Z Revision: (string) (len=1) "1", 2026-03-13T12:38:23.349284420Z NodeName: (string) "", 2026-03-13T12:38:23.349284420Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-03-13T12:38:23.349284420Z Clock: (clock.RealClock) { 2026-03-13T12:38:23.349284420Z }, 2026-03-13T12:38:23.349284420Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-03-13T12:38:23.349284420Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-13T12:38:23.349284420Z (string) (len=11) "etcd-client", 2026-03-13T12:38:23.349284420Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-03-13T12:38:23.349284420Z (string) (len=31) "localhost-recovery-client-token" 2026-03-13T12:38:23.349284420Z }, 2026-03-13T12:38:23.349284420Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-13T12:38:23.349284420Z (string) (len=17) "encryption-config", 2026-03-13T12:38:23.349284420Z (string) (len=21) "webhook-authenticator" 2026-03-13T12:38:23.349284420Z }, 2026-03-13T12:38:23.349284420Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-13T12:38:23.349284420Z (string) (len=18) "kube-apiserver-pod", 2026-03-13T12:38:23.349284420Z (string) (len=6) "config", 2026-03-13T12:38:23.349284420Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-03-13T12:38:23.349284420Z (string) (len=28) "bound-sa-token-signing-certs", 2026-03-13T12:38:23.349284420Z (string) (len=15) "etcd-serving-ca", 2026-03-13T12:38:23.349284420Z (string) (len=18) "kubelet-serving-ca", 2026-03-13T12:38:23.349284420Z (string) (len=22) "sa-token-signing-certs", 2026-03-13T12:38:23.349284420Z (string) (len=29) "kube-apiserver-audit-policies" 2026-03-13T12:38:23.349284420Z }, 2026-03-13T12:38:23.349284420Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-13T12:38:23.349284420Z (string) (len=14) "oauth-metadata", 2026-03-13T12:38:23.349284420Z (string) (len=12) "cloud-config", 2026-03-13T12:38:23.349284420Z (string) (len=24) "kube-apiserver-server-ca" 2026-03-13T12:38:23.349284420Z }, 2026-03-13T12:38:23.349284420Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-03-13T12:38:23.349284420Z (string) (len=17) "aggregator-client", 2026-03-13T12:38:23.349284420Z (string) (len=30) "localhost-serving-cert-certkey", 2026-03-13T12:38:23.349284420Z (string) (len=31) "service-network-serving-certkey", 2026-03-13T12:38:23.349284420Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-03-13T12:38:23.349284420Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-03-13T12:38:23.349284420Z (string) (len=33) "bound-service-account-signing-key", 2026-03-13T12:38:23.349284420Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-03-13T12:38:23.349284420Z (string) (len=31) "check-endpoints-client-cert-key", 2026-03-13T12:38:23.349284420Z (string) (len=14) "kubelet-client", 2026-03-13T12:38:23.349284420Z (string) (len=16) "node-kubeconfigs" 2026-03-13T12:38:23.349284420Z }, 2026-03-13T12:38:23.349284420Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-03-13T12:38:23.349284420Z (string) (len=17) "user-serving-cert", 2026-03-13T12:38:23.349284420Z (string) (len=21) "user-serving-cert-000", 2026-03-13T12:38:23.349284420Z (string) (len=21) "user-serving-cert-001", 2026-03-13T12:38:23.349284420Z (string) (len=21) "user-serving-cert-002", 2026-03-13T12:38:23.349284420Z (string) (len=21) "user-serving-cert-003", 2026-03-13T12:38:23.349284420Z (string) (len=21) "user-serving-cert-004", 2026-03-13T12:38:23.349284420Z (string) (len=21) "user-serving-cert-005", 2026-03-13T12:38:23.349284420Z (string) (len=21) "user-serving-cert-006", 2026-03-13T12:38:23.349284420Z (string) (len=21) "user-serving-cert-007", 2026-03-13T12:38:23.349284420Z (string) (len=21) "user-serving-cert-008", 2026-03-13T12:38:23.349284420Z (string) (len=21) "user-serving-cert-009" 2026-03-13T12:38:23.349284420Z }, 2026-03-13T12:38:23.349284420Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-03-13T12:38:23.349284420Z (string) (len=20) "aggregator-client-ca", 2026-03-13T12:38:23.349284420Z (string) (len=9) "client-ca", 2026-03-13T12:38:23.349284420Z (string) (len=29) "control-plane-node-kubeconfig", 2026-03-13T12:38:23.349284420Z (string) (len=26) "check-endpoints-kubeconfig" 2026-03-13T12:38:23.349284420Z }, 2026-03-13T12:38:23.349284420Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T12:38:23.349284420Z (string) (len=17) "trusted-ca-bundle" 2026-03-13T12:38:23.349284420Z }, 2026-03-13T12:38:23.349284420Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-03-13T12:38:23.349284420Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-13T12:38:23.349284420Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-13T12:38:23.349284420Z Timeout: (time.Duration) 2m0s, 2026-03-13T12:38:23.349284420Z StaticPodManifestsLockFile: (string) "", 2026-03-13T12:38:23.349284420Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-13T12:38:23.349284420Z KubeletVersion: (string) "" 2026-03-13T12:38:23.349284420Z }) 2026-03-13T12:38:23.349284420Z I0313 12:38:23.349052 1 cmd.go:413] Getting controller reference for node master-0 2026-03-13T12:38:23.524183956Z I0313 12:38:23.523889 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-13T12:38:23.524183956Z I0313 12:38:23.523946 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T12:38:23.524183956Z I0313 12:38:23.523956 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T12:38:23.548185599Z I0313 12:38:23.546585 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-13T12:38:53.547360589Z I0313 12:38:53.547101 1 cmd.go:524] Getting installer pods for node master-0 2026-03-13T12:39:07.549054649Z F0313 12:39:07.548771 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115155003025022657 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"88bf0bf8-c0ee-454e-8d8b-592a6e796cfc","resourceVersion":"9137","creationTimestamp":"2026-03-13T12:38:19Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.47/23\"],\"mac_address\":\"0a:58:0a:80:00:2f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.47/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.47\"\n ],\n \"mac\": \"0a:58:0a:80:00:2f\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"66e317d0-6312-4a95-ba71-8e2288c9acfb"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:14Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:19Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:13Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:13Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:19Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.47","podIPs":[{"ip":"10.128.0.47"}],"startTime":"2026-03-13T12:38:19Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0313 12:38:23.349052 1 cmd.go:413] Getting controller reference for node master-0\nI0313 12:38:23.523889 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0313 12:38:23.523946 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0313 12:38:23.523956 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0313 12:38:23.546585 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0313 12:38:53.547101 1 cmd.go:524] Getting installer pods for node master-0\nF0313 12:39:07.548771 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-13T12:38:22Z","finishedAt":"2026-03-13T12:39:08Z","containerID":"cri-o://f528e329070374fe2c7b4c96e9e572f6132a46e0533c48dae8a60425fcb61903"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","containerID":"cri-o://f528e329070374fe2c7b4c96e9e572f6132a46e0533c48dae8a60425fcb61903","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615155003025035757 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-13T12:35:09.596370027Z I0313 12:35:09.596123 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000010476615155003025032665 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-13T12:41:46.407717607Z I0313 12:41:46.407684 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.410794435Z I0313 12:41:46.410744 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.410922528Z I0313 12:41:46.410898 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.412649981Z I0313 12:41:46.412625 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.412749664Z I0313 12:41:46.412727 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.414866958Z I0313 12:41:46.414816 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.415003011Z I0313 12:41:46.414969 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.416694014Z I0313 12:41:46.416666 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.416882539Z I0313 12:41:46.416857 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.418612752Z I0313 12:41:46.418591 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.418716456Z I0313 12:41:46.418601 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.419070314Z I0313 12:41:46.419039 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.421064255Z I0313 12:41:46.421042 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.421398403Z I0313 12:41:46.421347 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.423401874Z I0313 12:41:46.423364 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.423492296Z I0313 12:41:46.423472 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.423878316Z I0313 12:41:46.423846 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.640983937Z I0313 12:41:46.640925 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.640983937Z I0313 12:41:46.640933 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.641020868Z I0313 12:41:46.640984 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.655407443Z I0313 12:41:46.651721 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.664998725Z I0313 12:41:46.664935 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.664998725Z I0313 12:41:46.664980 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.665501039Z I0313 12:41:46.665463 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.670077625Z I0313 12:41:46.670027 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.685531386Z I0313 12:41:46.685479 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.812760440Z I0313 12:41:46.812668 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.813476908Z I0313 12:41:46.813437 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.836384939Z I0313 12:41:46.836318 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:46.903365196Z I0313 12:41:46.903302 1 policy_source.go:224] refreshing policies 2026-03-13T12:41:46.916224392Z I0313 12:41:46.912913 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-13T12:41:46.916224392Z I0313 12:41:46.915872 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from runtime/asm_amd64.s:1695 2026-03-13T12:41:47.010090630Z I0313 12:41:47.010020 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:47.010090630Z I0313 12:41:47.010053 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:47.010426509Z I0313 12:41:47.010055 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:47.210169630Z I0313 12:41:47.210093 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:47.210501719Z I0313 12:41:47.210478 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:47.213103135Z I0313 12:41:47.211898 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:47.409330407Z I0313 12:41:47.409270 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:47.414257112Z I0313 12:41:47.414226 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:47.414278273Z I0313 12:41:47.414258 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:47.472678872Z E0313 12:41:47.472627 1 remote_available_controller.go:470] "Unhandled Error" err="v1.build.openshift.io failed with: failing or missing response from https://10.128.0.42:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/build.openshift.io/v1: 401" logger="UnhandledError" 2026-03-13T12:41:47.473527954Z E0313 12:41:47.473486 1 remote_available_controller.go:470] "Unhandled Error" err="v1.authorization.openshift.io failed with: failing or missing response from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: 401" logger="UnhandledError" 2026-03-13T12:41:47.637653703Z E0313 12:41:47.637558 1 remote_available_controller.go:470] "Unhandled Error" err="v1.project.openshift.io failed with: failing or missing response from https://10.128.0.42:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/project.openshift.io/v1: 401" logger="UnhandledError" 2026-03-13T12:41:47.804663224Z I0313 12:41:47.804607 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:47.805618249Z I0313 12:41:47.804760 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.088723132Z E0313 12:41:48.088667 1 remote_available_controller.go:470] "Unhandled Error" err="v1.route.openshift.io failed with: failing or missing response from https://10.128.0.42:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/route.openshift.io/v1: 401" logger="UnhandledError" 2026-03-13T12:41:48.089912303Z I0313 12:41:48.089885 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.091270407Z I0313 12:41:48.090347 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.091270407Z I0313 12:41:48.090373 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.099322761Z I0313 12:41:48.099276 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.099781603Z I0313 12:41:48.099742 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.105429136Z I0313 12:41:48.105384 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.114072355Z I0313 12:41:48.114026 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.209622787Z I0313 12:41:48.209565 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.210044827Z I0313 12:41:48.210022 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.210909989Z I0313 12:41:48.210874 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.435708095Z I0313 12:41:48.435413 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.436034413Z I0313 12:41:48.436002 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.436193737Z I0313 12:41:48.436174 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.476302294Z E0313 12:41:48.476245 1 remote_available_controller.go:470] "Unhandled Error" err="v1.apps.openshift.io failed with: failing or missing response from https://10.128.0.42:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/apps.openshift.io/v1: 401" logger="UnhandledError" 2026-03-13T12:41:48.609414147Z I0313 12:41:48.608923 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.609632542Z I0313 12:41:48.609592 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.610173946Z I0313 12:41:48.610122 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.818520055Z I0313 12:41:48.812845 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.818520055Z I0313 12:41:48.813911 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:48.818520055Z I0313 12:41:48.814720 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:49.010392408Z I0313 12:41:49.010005 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:49.010392408Z I0313 12:41:49.010011 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:49.010596223Z I0313 12:41:49.010570 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:49.235793230Z I0313 12:41:49.235729 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:49.235793230Z I0313 12:41:49.235747 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:49.238582269Z I0313 12:41:49.238219 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:49.545355164Z I0313 12:41:49.545298 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:49.546378809Z I0313 12:41:49.545707 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:49.562992410Z I0313 12:41:49.556821 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:49.580201376Z I0313 12:41:49.580126 1 controller.go:615] quota admission added evaluator for: machinehealthchecks.machine.openshift.io 2026-03-13T12:41:49.580247778Z I0313 12:41:49.580201 1 controller.go:615] quota admission added evaluator for: machinehealthchecks.machine.openshift.io 2026-03-13T12:41:49.609898569Z I0313 12:41:49.609825 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:49.611279294Z I0313 12:41:49.610596 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:49.810493532Z I0313 12:41:49.810378 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:49.810526703Z I0313 12:41:49.810506 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:50.009406742Z I0313 12:41:50.009292 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:50.010746496Z I0313 12:41:50.010693 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:50.209738769Z I0313 12:41:50.209219 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:50.210404286Z I0313 12:41:50.210373 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:50.409118851Z I0313 12:41:50.409049 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:50.411123772Z I0313 12:41:50.411093 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:50.611281714Z I0313 12:41:50.610158 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:50.611281714Z I0313 12:41:50.610463 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:50.809071016Z I0313 12:41:50.809016 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:50.810795009Z I0313 12:41:50.810769 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:51.008489259Z I0313 12:41:51.008419 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:51.009727560Z I0313 12:41:51.009696 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:51.209363319Z I0313 12:41:51.209308 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:51.210570010Z I0313 12:41:51.210532 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:51.553993272Z I0313 12:41:51.553921 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:51.554130195Z I0313 12:41:51.554099 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:51.650849906Z I0313 12:41:51.650776 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T12:41:51.808979383Z I0313 12:41:51.808922 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015155003025031137 0ustar00000000000000002026-03-13T12:35:05.294010269Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000001015115155003025037013 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-68bd585b-qxmnf2026-03-13T12:40:14.257172648Z I0313 12:40:14.256982 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T12:40:14.257172648Z I0313 12:40:14.257129 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T12:40:14.257711721Z I0313 12:40:14.257687 1 observer_polling.go:159] Starting file observer 2026-03-13T12:40:27.158610122Z I0313 12:40:27.158554 1 builder.go:304] kube-apiserver-operator version 4.18.0-202602132343.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-13T12:40:27.859717825Z I0313 12:40:27.859432 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T12:40:27.859717825Z W0313 12:40:27.859461 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T12:40:27.859717825Z W0313 12:40:27.859466 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T12:40:27.859717825Z W0313 12:40:27.859471 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T12:40:27.859717825Z W0313 12:40:27.859473 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T12:40:27.859717825Z W0313 12:40:27.859476 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T12:40:27.859717825Z W0313 12:40:27.859479 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T12:40:27.863954037Z I0313 12:40:27.863838 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T12:40:27.864012260Z I0313 12:40:27.863984 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T12:40:27.864165197Z I0313 12:40:27.863909 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T12:40:27.864193149Z I0313 12:40:27.864186 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T12:40:27.864237921Z I0313 12:40:27.863872 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T12:40:27.864373839Z I0313 12:40:27.864251 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T12:40:27.864373839Z I0313 12:40:27.864268 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T12:40:27.864442542Z I0313 12:40:27.863969 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T12:40:27.864442542Z I0313 12:40:27.864436 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T12:40:27.866366918Z I0313 12:40:27.864273 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T12:40:27.866366918Z I0313 12:40:27.864871 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock... 2026-03-13T12:40:27.964670385Z I0313 12:40:27.964590 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T12:40:27.964780111Z I0313 12:40:27.964753 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T12:40:27.964794021Z I0313 12:40:27.964786 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-apiserver-operator_previous.log0000640000000000000000000004702715155003025037221 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-68bd585b-qxmnf2026-03-13T12:38:57.551387910Z I0313 12:38:57.551379 1 base_controller.go:181] Shutting down kube-apiserver-StaticPodStateFallback ... 2026-03-13T12:38:57.551396720Z I0313 12:38:57.551386 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-13T12:38:57.551396720Z I0313 12:38:57.551391 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-13T12:38:57.551408361Z I0313 12:38:57.551398 1 base_controller.go:181] Shutting down PruneController ... 2026-03-13T12:38:57.551408361Z I0313 12:38:57.551403 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551416 1 base_controller.go:181] Shutting down WorkerLatencyProfile ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551418 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551426 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551437 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551453 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551460 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551484 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551494 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551523 1 base_controller.go:181] Shutting down webhookSupportabilityController ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551547 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionPrune controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551567 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionPrune workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551579 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionMigration controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551590 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionMigration workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551591 1 base_controller.go:123] Shutting down worker of kube-apiserver-StartupMonitorPodCondition controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551613 1 base_controller.go:113] All kube-apiserver-StartupMonitorPodCondition workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551624 1 controller_manager.go:54] kube-apiserver-StartupMonitorPodCondition controller terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551627 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551634 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551641 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551649 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551657 1 base_controller.go:123] Shutting down worker of kube-apiserver-InstallerState controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551664 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551668 1 base_controller.go:113] All kube-apiserver-InstallerState workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551676 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551237 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551694 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551696 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551705 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551678 1 controller_manager.go:54] kube-apiserver-InstallerState controller terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551717 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551728 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551732 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551741 1 base_controller.go:123] Shutting down worker of kube-apiserver-StaticPodStateFallback controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551746 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551759 1 base_controller.go:123] Shutting down worker of kube-apiserver-StaticPodState controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551769 1 base_controller.go:113] All kube-apiserver-StaticPodStateFallback workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551776 1 base_controller.go:113] All kube-apiserver-StaticPodState workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551781 1 controller_manager.go:54] kube-apiserver-StaticPodStateFallback controller terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551785 1 base_controller.go:123] Shutting down worker of BoundSATokenSignerController controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551789 1 controller_manager.go:54] kube-apiserver-StaticPodState controller terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551794 1 base_controller.go:113] All BoundSATokenSignerController workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551779 1 base_controller.go:123] Shutting down worker of kube-apiserver controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551802 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551809 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionKey controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551814 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551819 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionKey workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551794 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551829 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionCondition controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551772 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionState controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551835 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551845 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionState workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551842 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionCondition workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551849 1 controller_manager.go:54] PruneController controller terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551815 1 base_controller.go:113] All kube-apiserver workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551861 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551870 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551877 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551887 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T12:38:57.553257258Z I0313 12:38:57.551891 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-13T12:38:57.553257258Z E0313 12:38:57.552408 1 base_controller.go:279] "Unhandled Error" err="highCPUUsageAlertController reconciliation failed: Get \"https://172.30.0.1:443/apis/monitoring.coreos.com/v1/namespaces/openshift-kube-apiserver/prometheusrules/cpu-utilization\": context canceled" 2026-03-13T12:38:57.553801427Z I0313 12:38:57.553685 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"66fb7c4a-f1a4-4742-9d75-e64af82de36a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ConfigMapCreateFailed' Failed to create ConfigMap/kubelet-serving-ca-2 -n openshift-kube-apiserver: Post "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps": context canceled 2026-03-13T12:38:57.553801427Z E0313 12:38:57.553760 1 base_controller.go:279] "Unhandled Error" err="webhookSupportabilityController reconciliation failed: Put \"https://172.30.0.1:443/apis/operator.openshift.io/v1/kubeapiservers/cluster/status\": context canceled" 2026-03-13T12:38:57.553913432Z I0313 12:38:57.553862 1 base_controller.go:123] Shutting down worker of highCPUUsageAlertController controller ... 2026-03-13T12:38:57.553925532Z I0313 12:38:57.553911 1 base_controller.go:113] All highCPUUsageAlertController workers have been terminated 2026-03-13T12:38:57.554993681Z I0313 12:38:57.554936 1 base_controller.go:123] Shutting down worker of webhookSupportabilityController controller ... 2026-03-13T12:38:57.554993681Z I0313 12:38:57.554980 1 base_controller.go:113] All webhookSupportabilityController workers have been terminated 2026-03-13T12:38:57.555720307Z E0313 12:38:57.555671 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-13T12:38:57.557830914Z W0313 12:38:57.557412 1 base_controller.go:242] Updating status of "NodeKubeconfigController" failed: unable to ApplyStatus for operator using fieldManager "NodeKubeconfigController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-13T12:38:57.557830914Z E0313 12:38:57.557506 1 base_controller.go:279] "Unhandled Error" err="NodeKubeconfigController reconciliation failed: \"secret/node-kubeconfigs\": Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/node-kubeconfigs\": context canceled" 2026-03-13T12:38:57.559201474Z I0313 12:38:57.557973 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-13T12:38:57.559201474Z I0313 12:38:57.558002 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-13T12:38:57.559201474Z I0313 12:38:57.558035 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"66fb7c4a-f1a4-4742-9d75-e64af82de36a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' Failed to create installer pod for revision 1 count 0 on node "master-0": client rate limiter Wait returned an error: context canceled 2026-03-13T12:38:57.559201474Z W0313 12:38:57.558970 1 base_controller.go:242] Updating status of "RevisionController" failed: unable to ApplyStatus for operator using fieldManager "RevisionController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-13T12:38:57.559201474Z E0313 12:38:57.559018 1 base_controller.go:279] "Unhandled Error" err="RevisionController reconciliation failed: Post \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps\": context canceled" 2026-03-13T12:38:57.559201474Z I0313 12:38:57.559058 1 base_controller.go:123] Shutting down worker of NodeKubeconfigController controller ... 2026-03-13T12:38:57.559201474Z I0313 12:38:57.559078 1 base_controller.go:113] All NodeKubeconfigController workers have been terminated 2026-03-13T12:38:57.562454653Z I0313 12:38:57.562333 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-13T12:38:57.562454653Z I0313 12:38:57.562375 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-13T12:38:57.562454653Z I0313 12:38:57.562389 1 controller_manager.go:54] RevisionController controller terminated 2026-03-13T12:38:57.562825736Z W0313 12:38:57.562762 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-13T12:38:57.562825736Z W0313 12:38:57.562812 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-13T12:38:57.562843007Z W0313 12:38:57.562826 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-13T12:38:57.563095666Z E0313 12:38:57.563054 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-apiserver-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-13T12:38:57.563989169Z E0313 12:38:57.563923 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-13T12:38:57.564617891Z I0313 12:38:57.564572 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-13T12:38:57.564617891Z I0313 12:38:57.564600 1 base_controller.go:113] All Installer workers have been terminated 2026-03-13T12:38:57.564634992Z I0313 12:38:57.564615 1 controller_manager.go:54] Installer controller terminated 2026-03-13T12:38:57.565718561Z I0313 12:38:57.565675 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-13T12:38:57.565718561Z I0313 12:38:57.565701 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-13T12:38:57.577565902Z E0313 12:38:57.577504 1 base_controller.go:279] "Unhandled Error" err="KubeAPIServerStaticResources-StaticResources reconciliation failed: [\"assets/kube-apiserver/svc.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/services/apiserver\": context canceled, \"assets/kube-apiserver/check-endpoints-clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-clusterrole-node-reader.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-clusterrole-crd-reader.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-clusterrolebinding-auth-delegator.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-clusterrolebinding-node-reader.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-clusterrolebinding-crd-reader.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-rolebinding-kube-system.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/delegated-incluster-authentication-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/api-usage.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/audit-errors.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-requests.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-basic.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/podsecurity-violations.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-extended.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeAPIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T12:38:57.578820098Z I0313 12:38:57.578763 1 base_controller.go:123] Shutting down worker of KubeAPIServerStaticResources-StaticResources controller ... 2026-03-13T12:38:57.578820098Z I0313 12:38:57.578812 1 base_controller.go:113] All KubeAPIServerStaticResources-StaticResources workers have been terminated 2026-03-13T12:39:02.547599651Z I0313 12:39:02.547474 1 observer_polling.go:162] Shutting down file observer 2026-03-13T12:39:31.556433675Z E0313 12:39:31.556192 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T12:39:31.556433675Z W0313 12:39:31.556382 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-qxmnf.json0000640000000000000000000001362015155003025030003 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-68bd585b-qxmnf","generateName":"kube-apiserver-operator-68bd585b-","namespace":"openshift-kube-apiserver-operator","uid":"ec5ec2e2-f7b3-43a1-87da-fbbe0ee5b118","resourceVersion":"9145","creationTimestamp":"2026-03-13T12:35:29Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"68bd585b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.10/23\"],\"mac_address\":\"0a:58:0a:80:00:0a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.10/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.10\"\n ],\n \"mac\": \"0a:58:0a:80:00:0a\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-68bd585b","uid":"760778de-db5d-43ef-9ccd-7cd26df5163e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:22Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.10","podIPs":[{"ip":"10.128.0.10"}],"startTime":"2026-03-13T12:37:21Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-03-13T12:40:14Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T12:37:21Z","finishedAt":"2026-03-13T12:39:31Z","containerID":"cri-o://69f6736e401004be8e5844a5f9b7891b28a4228a05eb13fc36ff3b64b8740138"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","containerID":"cri-o://1cb4a8f4af6ffda12180066b17581cdbec2094bd2b21740cda6857348f632207","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007425015155003025025176 0ustar00000000000000002026-03-13T12:38:33.619023635Z cluster-etcd-operator rev \ 2026-03-13T12:38:33.619023635Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-03-13T12:38:33.619023635Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-03-13T12:38:33.619023635Z --client-key-file=$(ETCDCTL_KEY) \ 2026-03-13T12:38:33.619023635Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-03-13T12:38:33.619023635Z securityContext: 2026-03-13T12:38:33.619023635Z privileged: true 2026-03-13T12:38:33.619023635Z resources: 2026-03-13T12:38:33.619023635Z requests: 2026-03-13T12:38:33.619023635Z memory: 50Mi 2026-03-13T12:38:33.619023635Z cpu: 10m 2026-03-13T12:38:33.619023635Z env: 2026-03-13T12:38:33.619023635Z - name: "ALL_ETCD_ENDPOINTS" 2026-03-13T12:38:33.619023635Z value: "https://192.168.32.10:2379" 2026-03-13T12:38:33.619023635Z - name: "ETCDCTL_API" 2026-03-13T12:38:33.619023635Z value: "3" 2026-03-13T12:38:33.619023635Z - name: "ETCDCTL_CACERT" 2026-03-13T12:38:33.619023635Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-03-13T12:38:33.619023635Z - name: "ETCDCTL_CERT" 2026-03-13T12:38:33.619023635Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-03-13T12:38:33.619023635Z - name: "ETCDCTL_ENDPOINTS" 2026-03-13T12:38:33.619023635Z value: "https://192.168.32.10:2379" 2026-03-13T12:38:33.619023635Z - name: "ETCDCTL_KEY" 2026-03-13T12:38:33.619023635Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-03-13T12:38:33.619023635Z - name: "ETCD_CIPHER_SUITES" 2026-03-13T12:38:33.619023635Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-03-13T12:38:33.619023635Z - name: "ETCD_DATA_DIR" 2026-03-13T12:38:33.619023635Z value: "/var/lib/etcd" 2026-03-13T12:38:33.619023635Z - name: "ETCD_ELECTION_TIMEOUT" 2026-03-13T12:38:33.619023635Z value: "2500" 2026-03-13T12:38:33.619023635Z - name: "ETCD_ENABLE_PPROF" 2026-03-13T12:38:33.619023635Z value: "true" 2026-03-13T12:38:33.619023635Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-03-13T12:38:33.619023635Z value: "1" 2026-03-13T12:38:33.619023635Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-03-13T12:38:33.619124188Z value: "200ms" 2026-03-13T12:38:33.619124188Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-03-13T12:38:33.619124188Z value: "5s" 2026-03-13T12:38:33.619124188Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-03-13T12:38:33.619124188Z value: "500" 2026-03-13T12:38:33.619124188Z - name: "ETCD_IMAGE" 2026-03-13T12:38:33.619124188Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b" 2026-03-13T12:38:33.619124188Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-03-13T12:38:33.619124188Z value: "existing" 2026-03-13T12:38:33.619124188Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-03-13T12:38:33.619124188Z value: "8589934592" 2026-03-13T12:38:33.619124188Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-03-13T12:38:33.619124188Z value: "true" 2026-03-13T12:38:33.619124188Z - name: "ETCD_TLS_MIN_VERSION" 2026-03-13T12:38:33.619124188Z value: "TLS1.2" 2026-03-13T12:38:33.619124188Z - name: "NODE_master_0_ETCD_NAME" 2026-03-13T12:38:33.619124188Z value: "master-0" 2026-03-13T12:38:33.619124188Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-03-13T12:38:33.619124188Z value: "192.168.32.10" 2026-03-13T12:38:33.619124188Z - name: "NODE_master_0_IP" 2026-03-13T12:38:33.619124188Z value: "192.168.32.10" 2026-03-13T12:38:33.619124188Z volumeMounts: 2026-03-13T12:38:33.619124188Z - mountPath: /var/lib/etcd 2026-03-13T12:38:33.619124188Z name: data-dir 2026-03-13T12:38:33.619124188Z - mountPath: /etc/kubernetes/static-pod-certs 2026-03-13T12:38:33.619124188Z name: cert-dir 2026-03-13T12:38:33.619124188Z hostNetwork: true 2026-03-13T12:38:33.619124188Z priority: 2000001000 2026-03-13T12:38:33.619124188Z priorityClassName: system-node-critical 2026-03-13T12:38:33.619124188Z tolerations: 2026-03-13T12:38:33.619124188Z - operator: "Exists" 2026-03-13T12:38:33.619124188Z volumes: 2026-03-13T12:38:33.619124188Z - hostPath: 2026-03-13T12:38:33.619124188Z path: /etc/kubernetes/manifests 2026-03-13T12:38:33.619124188Z name: static-pod-dir 2026-03-13T12:38:33.619124188Z - hostPath: 2026-03-13T12:38:33.619124188Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-03-13T12:38:33.619124188Z name: resource-dir 2026-03-13T12:38:33.619124188Z - hostPath: 2026-03-13T12:38:33.619124188Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-03-13T12:38:33.619124188Z name: cert-dir 2026-03-13T12:38:33.619124188Z - hostPath: 2026-03-13T12:38:33.619124188Z path: /var/lib/etcd 2026-03-13T12:38:33.619124188Z type: "" 2026-03-13T12:38:33.619124188Z name: data-dir 2026-03-13T12:38:33.619124188Z - hostPath: 2026-03-13T12:38:33.619124188Z path: /usr/local/bin 2026-03-13T12:38:33.619124188Z name: usr-local-bin 2026-03-13T12:38:33.619124188Z - hostPath: 2026-03-13T12:38:33.619124188Z path: /var/log/etcd 2026-03-13T12:38:33.619124188Z name: log-dir 2026-03-13T12:38:33.619124188Z - hostPath: 2026-03-13T12:38:33.619124188Z path: /etc/kubernetes 2026-03-13T12:38:33.619124188Z name: config-dir 2026-03-13T12:38:33.619124188Z - hostPath: 2026-03-13T12:38:33.619124188Z path: /var/lib/etcd-auto-backup 2026-03-13T12:38:33.619124188Z name: etcd-auto-backup-dir 2026-03-13T12:38:33.646958421Z I0313 12:38:33.644266 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-03-13T12:38:33.646958421Z I0313 12:38:33.644544 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-13T12:38:33.646958421Z I0313 12:38:33.644557 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-13T12:38:33.646958421Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} 2026-03-13T12:38:47.816123605Z W0313 12:38:47.815904 1 recorder.go:207] Error creating event &Event{ObjectMeta:{installer-1-master-0.189c66eb3387c641.c63ac830 openshift-etcd 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-etcd,Name:installer-1-master-0,UID:00d2e134-62bb-4181-aa0a-22c9b9755b10,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:StaticPodInstallerCompleted,Message:Successfully installed revision 1,Source:EventSource{Component:static-pod-installer,Host:,},FirstTimestamp:2026-03-13 12:38:33.645016641 +0000 UTC m=+30.996320849,LastTimestamp:2026-03-13 12:38:33.645016641 +0000 UTC m=+30.996320849,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,}: the server was unable to return a response in the time allotted, but may still be processing the request (post events) config/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000001666615155003025023505 0ustar00000000000000002026-03-13T12:39:40.462395699Z I0313 12:39:40.462103 1 etcdcli_pool.go:70] creating a new cached client 2026-03-13T12:39:40.463973195Z 2026/03/13 12:39:40 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:40.464099048Z 2026/03/13 12:39:40 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:41.465154329Z 2026/03/13 12:39:41 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:41.465597688Z 2026/03/13 12:39:41 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:43.037823604Z 2026/03/13 12:39:43 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:43.267791030Z 2026/03/13 12:39:43 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:45.658636761Z 2026/03/13 12:39:45 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:45.883692876Z 2026/03/13 12:39:45 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:49.654656790Z 2026/03/13 12:39:49 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:49.812353599Z 2026/03/13 12:39:49 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:50.462515063Z {"level":"warn","ts":"2026-03-13T12:39:50.462222Z","logger":"etcd-client","caller":"v3@v3.5.14/retry_interceptor.go:63","msg":"retrying of unary invoker failed","target":"etcd-endpoints://0xc0005861e0/192.168.32.10:2379","attempt":0,"error":"rpc error: code = DeadlineExceeded desc = latest balancer error: last connection error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused\""} 2026-03-13T12:39:50.462630536Z E0313 12:39:50.462576 1 rev.go:160] error getting status from [https://192.168.32.10:2379]: context deadline exceeded 2026-03-13T12:39:50.462691127Z E0313 12:39:50.462629 1 rev.go:176] could not reach any endpoint to get the raft index 2026-03-13T12:39:50.463844203Z 2026/03/13 12:39:50 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:51.464770101Z 2026/03/13 12:39:51 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:52.832585606Z 2026/03/13 12:39:52 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:55.336867261Z 2026/03/13 12:39:55 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:56.844244129Z 2026/03/13 12:39:56 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:58.939056447Z 2026/03/13 12:39:58 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:40:00.463489928Z {"level":"warn","ts":"2026-03-13T12:40:00.463264Z","logger":"etcd-client","caller":"v3@v3.5.14/retry_interceptor.go:63","msg":"retrying of unary invoker failed","target":"etcd-endpoints://0xc0005861e0/192.168.32.10:2379","attempt":0,"error":"rpc error: code = DeadlineExceeded desc = latest balancer error: last connection error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused\""} 2026-03-13T12:40:00.463589161Z E0313 12:40:00.463570 1 rev.go:160] error getting status from [https://192.168.32.10:2379]: context deadline exceeded 2026-03-13T12:40:00.463670943Z E0313 12:40:00.463606 1 rev.go:176] could not reach any endpoint to get the raft index 2026-03-13T12:40:00.464987553Z 2026/03/13 12:40:00 WARNING: [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:40:01.466482834Z 2026/03/13 12:40:01 WARNING: [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000000050215155003025024165 0ustar00000000000000002026-03-13T12:39:30.229118881Z I0313 12:39:30.228917 1 readyz.go:175] Listening on 0.0.0.0:9980 2026-03-13T12:40:36.723096394Z I0313 12:40:36.722938 1 etcdcli_pool.go:70] creating a new cached client 2026-03-13T12:40:41.720007012Z I0313 12:40:41.719915 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000005771615155003025024360 0ustar00000000000000002026-03-13T12:39:29.973952547Z {"level":"info","ts":"2026-03-13T12:39:29.973777Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-13T12:39:29.974611383Z {"level":"info","ts":"2026-03-13T12:39:29.974570Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2026-03-13T12:39:29.974799647Z {"level":"info","ts":"2026-03-13T12:39:29.974762Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-13T12:39:29.974924230Z {"level":"info","ts":"2026-03-13T12:39:29.974869Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2026-03-13T12:39:29.974959970Z {"level":"info","ts":"2026-03-13T12:39:29.974932Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc00057c000/192.168.32.10:9978\""} 2026-03-13T12:39:29.974968021Z {"level":"info","ts":"2026-03-13T12:39:29.974958Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc00057c000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2026-03-13T12:39:29.974976811Z {"level":"info","ts":"2026-03-13T12:39:29.974966Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2026-03-13T12:39:29.975328259Z {"level":"info","ts":"2026-03-13T12:39:29.975294Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2026-03-13T12:39:29.975414430Z {"level":"info","ts":"2026-03-13T12:39:29.975366Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2026-03-13T12:39:29.975483152Z {"level":"info","ts":"2026-03-13T12:39:29.975463Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc00007ef40 } }"} 2026-03-13T12:39:29.975505402Z {"level":"info","ts":"2026-03-13T12:39:29.975485Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2026-03-13T12:39:29.975542804Z {"level":"info","ts":"2026-03-13T12:39:29.975527Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2026-03-13T12:39:29.975569395Z {"level":"info","ts":"2026-03-13T12:39:29.975540Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2026-03-13T12:39:29.975709238Z {"level":"info","ts":"2026-03-13T12:39:29.975632Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T12:39:29.978593073Z {"level":"info","ts":"2026-03-13T12:39:29.978505Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, CONNECTING"} 2026-03-13T12:39:29.978827848Z {"level":"info","ts":"2026-03-13T12:39:29.978448Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T12:39:29.979410680Z {"level":"info","ts":"2026-03-13T12:39:29.979358Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:29.979429261Z {"level":"warn","ts":"2026-03-13T12:39:29.979408Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:29.979460192Z {"level":"info","ts":"2026-03-13T12:39:29.979433Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:29.979497772Z {"level":"info","ts":"2026-03-13T12:39:29.979476Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, TRANSIENT_FAILURE"} 2026-03-13T12:39:29.979507473Z {"level":"info","ts":"2026-03-13T12:39:29.979494Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2026-03-13T12:39:29.980984456Z {"level":"info","ts":"2026-03-13T12:39:29.980938Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2026-03-13T12:39:29.980984456Z {"level":"info","ts":"2026-03-13T12:39:29.980963Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2026-03-13T12:39:29.980984456Z {"level":"info","ts":"2026-03-13T12:39:29.980972Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-03-13T12:39:29.981002746Z {"level":"info","ts":"2026-03-13T12:39:29.980979Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-03-13T12:39:29.981180491Z {"level":"info","ts":"2026-03-13T12:39:29.981153Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2026-03-13T12:39:29.981282583Z {"level":"info","ts":"2026-03-13T12:39:29.981242Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2026-03-13T12:39:29.981398406Z {"level":"info","ts":"2026-03-13T12:39:29.981363Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2026-03-13T12:39:30.979846657Z {"level":"info","ts":"2026-03-13T12:39:30.979683Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:30.979927559Z {"level":"info","ts":"2026-03-13T12:39:30.979840Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, IDLE"} 2026-03-13T12:39:30.979993321Z {"level":"info","ts":"2026-03-13T12:39:30.979912Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T12:39:30.980024811Z {"level":"info","ts":"2026-03-13T12:39:30.979993Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T12:39:30.980115783Z {"level":"info","ts":"2026-03-13T12:39:30.980046Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, CONNECTING"} 2026-03-13T12:39:30.980628624Z {"level":"info","ts":"2026-03-13T12:39:30.980559Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:30.980649165Z {"level":"warn","ts":"2026-03-13T12:39:30.980620Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:30.980688336Z {"level":"info","ts":"2026-03-13T12:39:30.980653Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:30.980696056Z {"level":"info","ts":"2026-03-13T12:39:30.980681Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, TRANSIENT_FAILURE"} 2026-03-13T12:39:32.773198540Z {"level":"info","ts":"2026-03-13T12:39:32.773063Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:32.773313543Z {"level":"info","ts":"2026-03-13T12:39:32.773207Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, IDLE"} 2026-03-13T12:39:32.773313543Z {"level":"info","ts":"2026-03-13T12:39:32.773263Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T12:39:32.773313543Z {"level":"info","ts":"2026-03-13T12:39:32.773302Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T12:39:32.773472656Z {"level":"info","ts":"2026-03-13T12:39:32.773404Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, CONNECTING"} 2026-03-13T12:39:32.773806303Z {"level":"info","ts":"2026-03-13T12:39:32.773732Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:32.773806303Z {"level":"warn","ts":"2026-03-13T12:39:32.773790Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:32.773847984Z {"level":"info","ts":"2026-03-13T12:39:32.773823Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:32.773877385Z {"level":"info","ts":"2026-03-13T12:39:32.773857Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, TRANSIENT_FAILURE"} 2026-03-13T12:39:35.428822769Z {"level":"info","ts":"2026-03-13T12:39:35.428723Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:35.428822769Z {"level":"info","ts":"2026-03-13T12:39:35.428782Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, IDLE"} 2026-03-13T12:39:35.428863650Z {"level":"info","ts":"2026-03-13T12:39:35.428817Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T12:39:35.428863650Z {"level":"info","ts":"2026-03-13T12:39:35.428840Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T12:39:35.429076746Z {"level":"info","ts":"2026-03-13T12:39:35.429037Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, CONNECTING"} 2026-03-13T12:39:35.429151007Z {"level":"info","ts":"2026-03-13T12:39:35.429099Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:35.429196098Z {"level":"warn","ts":"2026-03-13T12:39:35.429158Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:35.429231369Z {"level":"info","ts":"2026-03-13T12:39:35.429203Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:35.429270870Z {"level":"info","ts":"2026-03-13T12:39:35.429247Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, TRANSIENT_FAILURE"} 2026-03-13T12:39:39.727956200Z {"level":"info","ts":"2026-03-13T12:39:39.727770Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:39.727956200Z {"level":"info","ts":"2026-03-13T12:39:39.727878Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, IDLE"} 2026-03-13T12:39:39.728034472Z {"level":"info","ts":"2026-03-13T12:39:39.727949Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T12:39:39.728034472Z {"level":"info","ts":"2026-03-13T12:39:39.728007Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T12:39:39.728309528Z {"level":"info","ts":"2026-03-13T12:39:39.728199Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, CONNECTING"} 2026-03-13T12:39:39.728637415Z {"level":"info","ts":"2026-03-13T12:39:39.728546Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:39.728637415Z {"level":"warn","ts":"2026-03-13T12:39:39.728595Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:39.728666145Z {"level":"info","ts":"2026-03-13T12:39:39.728635Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:39.728730597Z {"level":"info","ts":"2026-03-13T12:39:39.728684Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, TRANSIENT_FAILURE"} 2026-03-13T12:39:46.134045921Z {"level":"info","ts":"2026-03-13T12:39:46.133928Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:46.134045921Z {"level":"info","ts":"2026-03-13T12:39:46.134009Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, IDLE"} 2026-03-13T12:39:46.134097792Z {"level":"info","ts":"2026-03-13T12:39:46.134038Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T12:39:46.134097792Z {"level":"info","ts":"2026-03-13T12:39:46.134066Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T12:39:46.134256985Z {"level":"info","ts":"2026-03-13T12:39:46.134188Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, CONNECTING"} 2026-03-13T12:39:46.134446070Z {"level":"info","ts":"2026-03-13T12:39:46.134401Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:46.134446070Z {"level":"warn","ts":"2026-03-13T12:39:46.134424Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:46.134495381Z {"level":"info","ts":"2026-03-13T12:39:46.134454Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:46.134519551Z {"level":"info","ts":"2026-03-13T12:39:46.134490Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, TRANSIENT_FAILURE"} 2026-03-13T12:39:56.154557006Z {"level":"info","ts":"2026-03-13T12:39:56.154380Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:56.154626537Z {"level":"info","ts":"2026-03-13T12:39:56.154598Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, IDLE"} 2026-03-13T12:39:56.154829732Z {"level":"info","ts":"2026-03-13T12:39:56.154740Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T12:39:56.154840442Z {"level":"info","ts":"2026-03-13T12:39:56.154825Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T12:39:56.155121958Z {"level":"info","ts":"2026-03-13T12:39:56.155001Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, CONNECTING"} 2026-03-13T12:39:56.155557699Z {"level":"info","ts":"2026-03-13T12:39:56.155490Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:56.155575429Z {"level":"warn","ts":"2026-03-13T12:39:56.155554Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:56.155640180Z {"level":"info","ts":"2026-03-13T12:39:56.155597Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:39:56.155691941Z {"level":"info","ts":"2026-03-13T12:39:56.155660Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, TRANSIENT_FAILURE"} 2026-03-13T12:40:15.962400368Z {"level":"info","ts":"2026-03-13T12:40:15.962263Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T12:40:15.962400368Z {"level":"info","ts":"2026-03-13T12:40:15.962329Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, IDLE"} 2026-03-13T12:40:15.962400368Z {"level":"info","ts":"2026-03-13T12:40:15.962358Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T12:40:15.962485970Z {"level":"info","ts":"2026-03-13T12:40:15.962402Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T12:40:15.962597883Z {"level":"info","ts":"2026-03-13T12:40:15.962527Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, CONNECTING"} 2026-03-13T12:40:15.968103917Z {"level":"info","ts":"2026-03-13T12:40:15.967951Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2026-03-13T12:40:15.968103917Z {"level":"info","ts":"2026-03-13T12:40:15.968002Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0004a3680, READY"} 2026-03-13T12:40:15.968103917Z {"level":"info","ts":"2026-03-13T12:40:15.968069Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2026-03-13T12:40:15.968176998Z {"level":"info","ts":"2026-03-13T12:40:15.968101Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000013346115155003025022704 0ustar00000000000000002026-03-13T12:41:46.136418382Z {"level":"info","ts":"2026-03-13T12:41:46.136385Z","caller":"traceutil/trace.go:171","msg":"trace[811784847] transaction","detail":"{read_only:false; response_revision:10901; number_of_response:1; }","duration":"708.666827ms","start":"2026-03-13T12:41:45.427706Z","end":"2026-03-13T12:41:46.136373Z","steps":["trace[811784847] 'process raft request' (duration: 708.192215ms)"],"step_count":1} 2026-03-13T12:41:46.136499794Z {"level":"warn","ts":"2026-03-13T12:41:46.136473Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.427693Z","time spent":"708.748419ms","remote":"[::1]:38948","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":1166,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} 2026-03-13T12:41:46.202855135Z {"level":"warn","ts":"2026-03-13T12:41:46.202770Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"769.904689ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/services/specs/openshift-machine-api/cluster-autoscaler-operator\" ","response":"range_response_count:1 size:2059"} 2026-03-13T12:41:46.202954117Z {"level":"warn","ts":"2026-03-13T12:41:46.202917Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"770.119664ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/machinehealthchecks.machine.openshift.io\" ","response":"range_response_count:1 size:12441"} 2026-03-13T12:41:46.203002819Z {"level":"info","ts":"2026-03-13T12:41:46.202940Z","caller":"traceutil/trace.go:171","msg":"trace[1433532470] transaction","detail":"{read_only:false; response_revision:10905; number_of_response:1; }","duration":"290.384588ms","start":"2026-03-13T12:41:45.912532Z","end":"2026-03-13T12:41:46.202917Z","steps":["trace[1433532470] 'process raft request' (duration: 289.968657ms)"],"step_count":1} 2026-03-13T12:41:46.203002819Z {"level":"warn","ts":"2026-03-13T12:41:46.202983Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"770.119945ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-13T12:41:46.203029729Z {"level":"info","ts":"2026-03-13T12:41:46.202971Z","caller":"traceutil/trace.go:171","msg":"trace[1977068626] range","detail":"{range_begin:/kubernetes.io/services/specs/openshift-machine-api/cluster-autoscaler-operator; range_end:; response_count:1; response_revision:10905; }","duration":"770.095714ms","start":"2026-03-13T12:41:45.432834Z","end":"2026-03-13T12:41:46.202930Z","steps":["trace[1977068626] 'agreement among raft nodes before linearized reading' (duration: 769.815537ms)"],"step_count":1} 2026-03-13T12:41:46.203082252Z {"level":"warn","ts":"2026-03-13T12:41:46.203046Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"770.206207ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-image-registry/node-ca\" ","response":"range_response_count:1 size:1160"} 2026-03-13T12:41:46.203093622Z {"level":"info","ts":"2026-03-13T12:41:46.203080Z","caller":"traceutil/trace.go:171","msg":"trace[2144717802] range","detail":"{range_begin:/kubernetes.io/roles/openshift-image-registry/node-ca; range_end:; response_count:1; response_revision:10905; }","duration":"770.245867ms","start":"2026-03-13T12:41:45.432828Z","end":"2026-03-13T12:41:46.203073Z","steps":["trace[2144717802] 'agreement among raft nodes before linearized reading' (duration: 770.194136ms)"],"step_count":1} 2026-03-13T12:41:46.203132293Z {"level":"warn","ts":"2026-03-13T12:41:46.203101Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"770.32613ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/oauths.config.openshift.io\" ","response":"range_response_count:1 size:27000"} 2026-03-13T12:41:46.203191234Z {"level":"warn","ts":"2026-03-13T12:41:46.203107Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"767.730614ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/events/openshift-kube-scheduler/\" range_end:\"/kubernetes.io/events/openshift-kube-scheduler0\" ","response":"range_response_count:14 size:11019"} 2026-03-13T12:41:46.203203065Z {"level":"warn","ts":"2026-03-13T12:41:46.203182Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"770.551006ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-13T12:41:46.203203065Z {"level":"warn","ts":"2026-03-13T12:41:46.203181Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"770.236038ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-operator-lifecycle-manager/collect-profiles\" ","response":"range_response_count:0 size:5"} 2026-03-13T12:41:46.203210825Z {"level":"info","ts":"2026-03-13T12:41:46.203198Z","caller":"traceutil/trace.go:171","msg":"trace[632730172] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10905; }","duration":"770.593166ms","start":"2026-03-13T12:41:45.432601Z","end":"2026-03-13T12:41:46.203194Z","steps":["trace[632730172] 'agreement among raft nodes before linearized reading' (duration: 770.563506ms)"],"step_count":1} 2026-03-13T12:41:46.203238895Z {"level":"info","ts":"2026-03-13T12:41:46.203213Z","caller":"traceutil/trace.go:171","msg":"trace[1572380678] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-operator-lifecycle-manager/collect-profiles; range_end:; response_count:0; response_revision:10905; }","duration":"770.274639ms","start":"2026-03-13T12:41:45.432927Z","end":"2026-03-13T12:41:46.203202Z","steps":["trace[1572380678] 'agreement among raft nodes before linearized reading' (duration: 770.194097ms)"],"step_count":1} 2026-03-13T12:41:46.203238895Z {"level":"info","ts":"2026-03-13T12:41:46.203212Z","caller":"traceutil/trace.go:171","msg":"trace[1538450891] range","detail":"{range_begin:/kubernetes.io/events/openshift-kube-scheduler/; range_end:/kubernetes.io/events/openshift-kube-scheduler0; response_count:14; response_revision:10905; }","duration":"767.849737ms","start":"2026-03-13T12:41:45.435345Z","end":"2026-03-13T12:41:46.203195Z","steps":["trace[1538450891] 'agreement among raft nodes before linearized reading' (duration: 767.624271ms)"],"step_count":1} 2026-03-13T12:41:46.203258306Z {"level":"warn","ts":"2026-03-13T12:41:46.203230Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.432588Z","time spent":"770.628848ms","remote":"[::1]:39618","response type":"/etcdserverpb.KV/Range","request count":0,"request size":34,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/serviceaccounts\" limit:1 "} 2026-03-13T12:41:46.203265366Z {"level":"warn","ts":"2026-03-13T12:41:46.203246Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.432920Z","time spent":"770.3194ms","remote":"[::1]:39456","response type":"/etcdserverpb.KV/Range","request count":0,"request size":83,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/rolebindings/openshift-operator-lifecycle-manager/collect-profiles\" "} 2026-03-13T12:41:46.203285867Z {"level":"warn","ts":"2026-03-13T12:41:46.202820Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"770.020341ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-marketplace/openshift-marketplace-metrics\" ","response":"range_response_count:1 size:1175"} 2026-03-13T12:41:46.203328558Z {"level":"info","ts":"2026-03-13T12:41:46.203310Z","caller":"traceutil/trace.go:171","msg":"trace[829558785] range","detail":"{range_begin:/kubernetes.io/roles/openshift-marketplace/openshift-marketplace-metrics; range_end:; response_count:1; response_revision:10905; }","duration":"770.542266ms","start":"2026-03-13T12:41:45.432760Z","end":"2026-03-13T12:41:46.203303Z","steps":["trace[829558785] 'agreement among raft nodes before linearized reading' (duration: 769.980371ms)"],"step_count":1} 2026-03-13T12:41:46.203363818Z {"level":"warn","ts":"2026-03-13T12:41:46.203318Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"768.314218ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/cluster-monitoring-operator-namespaced\" ","response":"range_response_count:1 size:1628"} 2026-03-13T12:41:46.203397319Z {"level":"info","ts":"2026-03-13T12:41:46.203367Z","caller":"traceutil/trace.go:171","msg":"trace[410861567] range","detail":"{range_begin:/kubernetes.io/clusterroles/cluster-monitoring-operator-namespaced; range_end:; response_count:1; response_revision:10905; }","duration":"768.358489ms","start":"2026-03-13T12:41:45.434998Z","end":"2026-03-13T12:41:46.203356Z","steps":["trace[410861567] 'agreement among raft nodes before linearized reading' (duration: 768.285058ms)"],"step_count":1} 2026-03-13T12:41:46.203397319Z {"level":"warn","ts":"2026-03-13T12:41:46.203115Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.432831Z","time spent":"770.275339ms","remote":"[::1]:39770","response type":"/etcdserverpb.KV/Range","request count":0,"request size":81,"response count":1,"response size":2083,"request content":"key:\"/kubernetes.io/services/specs/openshift-machine-api/cluster-autoscaler-operator\" "} 2026-03-13T12:41:46.203405960Z {"level":"warn","ts":"2026-03-13T12:41:46.203382Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"770.272998ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/configmaps/openshift-ingress-operator/trusted-ca\" ","response":"range_response_count:1 size:225180"} 2026-03-13T12:41:46.203414960Z {"level":"warn","ts":"2026-03-13T12:41:46.203398Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"532.087612ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/infrastructure.cluster.x-k8s.io/metal3remediations/\" range_end:\"/kubernetes.io/infrastructure.cluster.x-k8s.io/metal3remediations0\" count_only:true ","response":"range_response_count:0 size:5"} 2026-03-13T12:41:46.203432260Z {"level":"warn","ts":"2026-03-13T12:41:46.203401Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.434982Z","time spent":"768.411101ms","remote":"[::1]:39192","response type":"/etcdserverpb.KV/Range","request count":0,"request size":68,"response count":1,"response size":1652,"request content":"key:\"/kubernetes.io/clusterroles/cluster-monitoring-operator-namespaced\" "} 2026-03-13T12:41:46.203454341Z {"level":"info","ts":"2026-03-13T12:41:46.203425Z","caller":"traceutil/trace.go:171","msg":"trace[72037451] range","detail":"{range_begin:/kubernetes.io/infrastructure.cluster.x-k8s.io/metal3remediations/; range_end:/kubernetes.io/infrastructure.cluster.x-k8s.io/metal3remediations0; response_count:0; response_revision:10905; }","duration":"532.122623ms","start":"2026-03-13T12:41:45.671293Z","end":"2026-03-13T12:41:46.203416Z","steps":["trace[72037451] 'agreement among raft nodes before linearized reading' (duration: 532.060951ms)"],"step_count":1} 2026-03-13T12:41:46.203454341Z {"level":"info","ts":"2026-03-13T12:41:46.203414Z","caller":"traceutil/trace.go:171","msg":"trace[1120990297] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-ingress-operator/trusted-ca; range_end:; response_count:1; response_revision:10905; }","duration":"770.32232ms","start":"2026-03-13T12:41:45.433083Z","end":"2026-03-13T12:41:46.203406Z","steps":["trace[1120990297] 'agreement among raft nodes before linearized reading' (duration: 770.217967ms)"],"step_count":1} 2026-03-13T12:41:46.203462491Z {"level":"warn","ts":"2026-03-13T12:41:46.203429Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"770.524965ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-cloud-controller-manager/cloud-controller-manager\" ","response":"range_response_count:1 size:1122"} 2026-03-13T12:41:46.203484041Z {"level":"warn","ts":"2026-03-13T12:41:46.203460Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.433076Z","time spent":"770.378361ms","remote":"[::1]:38948","response type":"/etcdserverpb.KV/Range","request count":0,"request size":65,"response count":1,"response size":225204,"request content":"key:\"/kubernetes.io/configmaps/openshift-ingress-operator/trusted-ca\" "} 2026-03-13T12:41:46.203484041Z {"level":"info","ts":"2026-03-13T12:41:46.203469Z","caller":"traceutil/trace.go:171","msg":"trace[1783921519] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-cloud-controller-manager/cloud-controller-manager; range_end:; response_count:1; response_revision:10905; }","duration":"770.567196ms","start":"2026-03-13T12:41:45.432892Z","end":"2026-03-13T12:41:46.203459Z","steps":["trace[1783921519] 'agreement among raft nodes before linearized reading' (duration: 770.504914ms)"],"step_count":1} 2026-03-13T12:41:46.203494382Z {"level":"info","ts":"2026-03-13T12:41:46.203129Z","caller":"traceutil/trace.go:171","msg":"trace[1607485303] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/oauths.config.openshift.io; range_end:; response_count:1; response_revision:10905; }","duration":"770.369562ms","start":"2026-03-13T12:41:45.432753Z","end":"2026-03-13T12:41:46.203123Z","steps":["trace[1607485303] 'agreement among raft nodes before linearized reading' (duration: 770.305199ms)"],"step_count":1} 2026-03-13T12:41:46.203520262Z {"level":"warn","ts":"2026-03-13T12:41:46.203492Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.432888Z","time spent":"770.599057ms","remote":"[::1]:39456","response type":"/etcdserverpb.KV/Range","request count":0,"request size":89,"response count":1,"response size":1146,"request content":"key:\"/kubernetes.io/rolebindings/openshift-cloud-controller-manager/cloud-controller-manager\" "} 2026-03-13T12:41:46.203520262Z {"level":"warn","ts":"2026-03-13T12:41:46.203500Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.432747Z","time spent":"770.748131ms","remote":"[::1]:39514","response type":"/etcdserverpb.KV/Range","request count":0,"request size":90,"response count":1,"response size":27024,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/oauths.config.openshift.io\" "} 2026-03-13T12:41:46.203587744Z {"level":"warn","ts":"2026-03-13T12:41:46.203528Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"767.896868ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/operatorgroups\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-13T12:41:46.203587744Z {"level":"info","ts":"2026-03-13T12:41:46.203561Z","caller":"traceutil/trace.go:171","msg":"trace[255826210] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/operatorgroups; range_end:; response_count:0; response_revision:10905; }","duration":"767.924369ms","start":"2026-03-13T12:41:45.435617Z","end":"2026-03-13T12:41:46.203541Z","steps":["trace[255826210] 'agreement among raft nodes before linearized reading' (duration: 767.889238ms)"],"step_count":1} 2026-03-13T12:41:46.203587744Z {"level":"warn","ts":"2026-03-13T12:41:46.203459Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.671251Z","time spent":"532.201125ms","remote":"[::1]:39558","response type":"/etcdserverpb.KV/Range","request count":0,"request size":138,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/infrastructure.cluster.x-k8s.io/metal3remediations/\" range_end:\"/kubernetes.io/infrastructure.cluster.x-k8s.io/metal3remediations0\" count_only:true "} 2026-03-13T12:41:46.203611315Z {"level":"warn","ts":"2026-03-13T12:41:46.203377Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.432755Z","time spent":"770.589257ms","remote":"[::1]:39874","response type":"/etcdserverpb.KV/Range","request count":0,"request size":74,"response count":1,"response size":1199,"request content":"key:\"/kubernetes.io/roles/openshift-marketplace/openshift-marketplace-metrics\" "} 2026-03-13T12:41:46.203644815Z {"level":"warn","ts":"2026-03-13T12:41:46.202859Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"767.274992ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterrolebindings/cluster-node-tuning:tuned\" ","response":"range_response_count:1 size:1256"} 2026-03-13T12:41:46.203672246Z {"level":"info","ts":"2026-03-13T12:41:46.203644Z","caller":"traceutil/trace.go:171","msg":"trace[936021317] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/cluster-node-tuning:tuned; range_end:; response_count:1; response_revision:10905; }","duration":"768.106793ms","start":"2026-03-13T12:41:45.435530Z","end":"2026-03-13T12:41:46.203636Z","steps":["trace[936021317] 'agreement among raft nodes before linearized reading' (duration: 767.20854ms)"],"step_count":1} 2026-03-13T12:41:46.203672246Z {"level":"info","ts":"2026-03-13T12:41:46.202959Z","caller":"traceutil/trace.go:171","msg":"trace[1277578984] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/machinehealthchecks.machine.openshift.io; range_end:; response_count:1; response_revision:10905; }","duration":"770.160305ms","start":"2026-03-13T12:41:45.432785Z","end":"2026-03-13T12:41:46.202946Z","steps":["trace[1277578984] 'agreement among raft nodes before linearized reading' (duration: 770.106304ms)"],"step_count":1} 2026-03-13T12:41:46.203672246Z {"level":"warn","ts":"2026-03-13T12:41:46.202922Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"768.870093ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/services/specs/openshift-machine-api/cluster-baremetal-webhook-service\" ","response":"range_response_count:1 size:1870"} 2026-03-13T12:41:46.203694527Z {"level":"warn","ts":"2026-03-13T12:41:46.203657Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"771.0967ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/system:openshift:aggregate-snapshots-to-view\" ","response":"range_response_count:1 size:1474"} 2026-03-13T12:41:46.203694527Z {"level":"warn","ts":"2026-03-13T12:41:46.203672Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.435520Z","time spent":"768.145885ms","remote":"[::1]:34042","response type":"/etcdserverpb.KV/Range","request count":0,"request size":62,"response count":1,"response size":1280,"request content":"key:\"/kubernetes.io/clusterrolebindings/cluster-node-tuning:tuned\" "} 2026-03-13T12:41:46.203705807Z {"level":"info","ts":"2026-03-13T12:41:46.203689Z","caller":"traceutil/trace.go:171","msg":"trace[1123453515] range","detail":"{range_begin:/kubernetes.io/clusterroles/system:openshift:aggregate-snapshots-to-view; range_end:; response_count:1; response_revision:10905; }","duration":"771.12843ms","start":"2026-03-13T12:41:45.432551Z","end":"2026-03-13T12:41:46.203680Z","steps":["trace[1123453515] 'agreement among raft nodes before linearized reading' (duration: 771.061739ms)"],"step_count":1} 2026-03-13T12:41:46.203714617Z {"level":"info","ts":"2026-03-13T12:41:46.203686Z","caller":"traceutil/trace.go:171","msg":"trace[1563856776] range","detail":"{range_begin:/kubernetes.io/services/specs/openshift-machine-api/cluster-baremetal-webhook-service; range_end:; response_count:1; response_revision:10905; }","duration":"769.669573ms","start":"2026-03-13T12:41:45.434005Z","end":"2026-03-13T12:41:46.203675Z","steps":["trace[1563856776] 'agreement among raft nodes before linearized reading' (duration: 768.792491ms)"],"step_count":1} 2026-03-13T12:41:46.203753088Z {"level":"warn","ts":"2026-03-13T12:41:46.203722Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.432519Z","time spent":"771.196031ms","remote":"[::1]:39192","response type":"/etcdserverpb.KV/Range","request count":0,"request size":74,"response count":1,"response size":1498,"request content":"key:\"/kubernetes.io/clusterroles/system:openshift:aggregate-snapshots-to-view\" "} 2026-03-13T12:41:46.203796929Z {"level":"warn","ts":"2026-03-13T12:41:46.203103Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.432824Z","time spent":"770.272389ms","remote":"[::1]:39874","response type":"/etcdserverpb.KV/Range","request count":0,"request size":55,"response count":1,"response size":1184,"request content":"key:\"/kubernetes.io/roles/openshift-image-registry/node-ca\" "} 2026-03-13T12:41:46.203805189Z {"level":"warn","ts":"2026-03-13T12:41:46.203594Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.435612Z","time spent":"767.97482ms","remote":"[::1]:39506","response type":"/etcdserverpb.KV/Range","request count":0,"request size":54,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/operators.coreos.com/operatorgroups\" limit:1 "} 2026-03-13T12:41:46.203812610Z {"level":"warn","ts":"2026-03-13T12:41:46.203263Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.435332Z","time spent":"767.916729ms","remote":"[::1]:46252","response type":"/etcdserverpb.KV/Range","request count":0,"request size":98,"response count":14,"response size":11043,"request content":"key:\"/kubernetes.io/events/openshift-kube-scheduler/\" range_end:\"/kubernetes.io/events/openshift-kube-scheduler0\" "} 2026-03-13T12:41:46.203812610Z {"level":"warn","ts":"2026-03-13T12:41:46.203794Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"776.075815ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook\" ","response":"range_response_count:1 size:5206"} 2026-03-13T12:41:46.203830650Z {"level":"warn","ts":"2026-03-13T12:41:46.203674Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.432782Z","time spent":"770.887544ms","remote":"[::1]:39514","response type":"/etcdserverpb.KV/Range","request count":0,"request size":104,"response count":1,"response size":12465,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/machinehealthchecks.machine.openshift.io\" "} 2026-03-13T12:41:46.203837900Z {"level":"info","ts":"2026-03-13T12:41:46.203821Z","caller":"traceutil/trace.go:171","msg":"trace[893655988] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook; range_end:; response_count:1; response_revision:10905; }","duration":"776.126876ms","start":"2026-03-13T12:41:45.427687Z","end":"2026-03-13T12:41:46.203814Z","steps":["trace[893655988] 'agreement among raft nodes before linearized reading' (duration: 776.049724ms)"],"step_count":1} 2026-03-13T12:41:46.203869541Z {"level":"warn","ts":"2026-03-13T12:41:46.203843Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.427674Z","time spent":"776.164257ms","remote":"[::1]:39386","response type":"/etcdserverpb.KV/Range","request count":0,"request size":87,"response count":1,"response size":5230,"request content":"key:\"/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook\" "} 2026-03-13T12:41:46.203869541Z {"level":"warn","ts":"2026-03-13T12:41:46.202882Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"770.053592ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-config/coreos-pull-secret-reader\" ","response":"range_response_count:1 size:931"} 2026-03-13T12:41:46.203893822Z {"level":"warn","ts":"2026-03-13T12:41:46.203868Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"771.304655ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/security.openshift.io/securitycontextconstraints/hostaccess\" ","response":"range_response_count:1 size:2496"} 2026-03-13T12:41:46.203893822Z {"level":"info","ts":"2026-03-13T12:41:46.203876Z","caller":"traceutil/trace.go:171","msg":"trace[1629429838] range","detail":"{range_begin:/kubernetes.io/roles/openshift-config/coreos-pull-secret-reader; range_end:; response_count:1; response_revision:10905; }","duration":"771.061578ms","start":"2026-03-13T12:41:45.432808Z","end":"2026-03-13T12:41:46.203870Z","steps":["trace[1629429838] 'agreement among raft nodes before linearized reading' (duration: 770.045672ms)"],"step_count":1} 2026-03-13T12:41:46.203916512Z {"level":"info","ts":"2026-03-13T12:41:46.203893Z","caller":"traceutil/trace.go:171","msg":"trace[1459606216] range","detail":"{range_begin:/kubernetes.io/security.openshift.io/securitycontextconstraints/hostaccess; range_end:; response_count:1; response_revision:10905; }","duration":"771.330095ms","start":"2026-03-13T12:41:45.432557Z","end":"2026-03-13T12:41:46.203887Z","steps":["trace[1459606216] 'agreement among raft nodes before linearized reading' (duration: 771.280834ms)"],"step_count":1} 2026-03-13T12:41:46.203939203Z {"level":"warn","ts":"2026-03-13T12:41:46.203919Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.432551Z","time spent":"771.363236ms","remote":"[::1]:39078","response type":"/etcdserverpb.KV/Range","request count":0,"request size":76,"response count":1,"response size":2520,"request content":"key:\"/kubernetes.io/security.openshift.io/securitycontextconstraints/hostaccess\" "} 2026-03-13T12:41:46.203976954Z {"level":"warn","ts":"2026-03-13T12:41:46.203042Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"770.477332ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterrolebindings/cluster-storage-operator-role\" ","response":"range_response_count:1 size:1445"} 2026-03-13T12:41:46.203985704Z {"level":"warn","ts":"2026-03-13T12:41:46.202910Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"770.073243ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/containerruntimeconfigs.machineconfiguration.openshift.io\" ","response":"range_response_count:1 size:8578"} 2026-03-13T12:41:46.204021325Z {"level":"info","ts":"2026-03-13T12:41:46.203988Z","caller":"traceutil/trace.go:171","msg":"trace[351483037] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/containerruntimeconfigs.machineconfiguration.openshift.io; range_end:; response_count:1; response_revision:10905; }","duration":"771.168761ms","start":"2026-03-13T12:41:45.432812Z","end":"2026-03-13T12:41:46.203981Z","steps":["trace[351483037] 'agreement among raft nodes before linearized reading' (duration: 770.040882ms)"],"step_count":1} 2026-03-13T12:41:46.204070766Z {"level":"warn","ts":"2026-03-13T12:41:46.204022Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.432804Z","time spent":"771.211652ms","remote":"[::1]:39514","response type":"/etcdserverpb.KV/Range","request count":0,"request size":121,"response count":1,"response size":8602,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/containerruntimeconfigs.machineconfiguration.openshift.io\" "} 2026-03-13T12:41:46.204098367Z {"level":"warn","ts":"2026-03-13T12:41:46.203897Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.432804Z","time spent":"771.087889ms","remote":"[::1]:39874","response type":"/etcdserverpb.KV/Range","request count":0,"request size":65,"response count":1,"response size":955,"request content":"key:\"/kubernetes.io/roles/openshift-config/coreos-pull-secret-reader\" "} 2026-03-13T12:41:46.204164148Z {"level":"info","ts":"2026-03-13T12:41:46.203987Z","caller":"traceutil/trace.go:171","msg":"trace[1981145983] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/cluster-storage-operator-role; range_end:; response_count:1; response_revision:10905; }","duration":"771.440338ms","start":"2026-03-13T12:41:45.432535Z","end":"2026-03-13T12:41:46.203975Z","steps":["trace[1981145983] 'agreement among raft nodes before linearized reading' (duration: 770.441942ms)"],"step_count":1} 2026-03-13T12:41:46.204164148Z {"level":"warn","ts":"2026-03-13T12:41:46.203495Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"767.834277ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/operator-lifecycle-manager-packageserver\" ","response":"range_response_count:1 size:2660"} 2026-03-13T12:41:46.204178039Z {"level":"warn","ts":"2026-03-13T12:41:46.204157Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.432523Z","time spent":"771.605431ms","remote":"[::1]:34042","response type":"/etcdserverpb.KV/Range","request count":0,"request size":66,"response count":1,"response size":1469,"request content":"key:\"/kubernetes.io/clusterrolebindings/cluster-storage-operator-role\" "} 2026-03-13T12:41:46.204207289Z {"level":"warn","ts":"2026-03-13T12:41:46.203725Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.433996Z","time spent":"769.718184ms","remote":"[::1]:39770","response type":"/etcdserverpb.KV/Range","request count":0,"request size":87,"response count":1,"response size":1894,"request content":"key:\"/kubernetes.io/services/specs/openshift-machine-api/cluster-baremetal-webhook-service\" "} 2026-03-13T12:41:46.204239420Z {"level":"warn","ts":"2026-03-13T12:41:46.203337Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"283.369091ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusterversions/version\" ","response":"range_response_count:1 size:5542"} 2026-03-13T12:41:46.204298092Z {"level":"info","ts":"2026-03-13T12:41:46.204256Z","caller":"traceutil/trace.go:171","msg":"trace[523952468] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:10905; }","duration":"284.305894ms","start":"2026-03-13T12:41:45.919930Z","end":"2026-03-13T12:41:46.204236Z","steps":["trace[523952468] 'agreement among raft nodes before linearized reading' (duration: 283.31921ms)"],"step_count":1} 2026-03-13T12:41:46.204308402Z {"level":"info","ts":"2026-03-13T12:41:46.203010Z","caller":"traceutil/trace.go:171","msg":"trace[679423400] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:10905; }","duration":"770.173866ms","start":"2026-03-13T12:41:45.432828Z","end":"2026-03-13T12:41:46.203002Z","steps":["trace[679423400] 'agreement among raft nodes before linearized reading' (duration: 770.115314ms)"],"step_count":1} 2026-03-13T12:41:46.204371223Z {"level":"warn","ts":"2026-03-13T12:41:46.204329Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.432822Z","time spent":"771.492369ms","remote":"[::1]:39504","response type":"/etcdserverpb.KV/Range","request count":0,"request size":52,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 "} 2026-03-13T12:41:46.204400744Z {"level":"info","ts":"2026-03-13T12:41:46.204174Z","caller":"traceutil/trace.go:171","msg":"trace[1509321066] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators/operator-lifecycle-manager-packageserver; range_end:; response_count:1; response_revision:10905; }","duration":"768.517054ms","start":"2026-03-13T12:41:45.435641Z","end":"2026-03-13T12:41:46.204158Z","steps":["trace[1509321066] 'agreement among raft nodes before linearized reading' (duration: 767.832147ms)"],"step_count":1} 2026-03-13T12:41:46.204449875Z {"level":"warn","ts":"2026-03-13T12:41:46.204428Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.435633Z","time spent":"768.784841ms","remote":"[::1]:39026","response type":"/etcdserverpb.KV/Range","request count":0,"request size":94,"response count":1,"response size":2684,"request content":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/operator-lifecycle-manager-packageserver\" "} 2026-03-13T12:41:46.204471456Z {"level":"warn","ts":"2026-03-13T12:41:46.203369Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"770.455803ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-insights/insights-operator-obfuscation-secret\" ","response":"range_response_count:1 size:1286"} 2026-03-13T12:41:46.204508008Z {"level":"info","ts":"2026-03-13T12:41:46.204491Z","caller":"traceutil/trace.go:171","msg":"trace[1848635277] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-insights/insights-operator-obfuscation-secret; range_end:; response_count:1; response_revision:10905; }","duration":"771.596992ms","start":"2026-03-13T12:41:45.432886Z","end":"2026-03-13T12:41:46.204483Z","steps":["trace[1848635277] 'agreement among raft nodes before linearized reading' (duration: 769.759715ms)"],"step_count":1} 2026-03-13T12:41:46.204557619Z {"level":"warn","ts":"2026-03-13T12:41:46.204542Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T12:41:45.432882Z","time spent":"771.652984ms","remote":"[::1]:39456","response type":"/etcdserverpb.KV/Range","request count":0,"request size":85,"response count":1,"response size":1310,"request content":"key:\"/kubernetes.io/rolebindings/openshift-insights/insights-operator-obfuscation-secret\" "} 2026-03-13T12:41:47.803943977Z {"level":"warn","ts":"2026-03-13T12:41:47.803836Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"217.795799ms","expected-duration":"200ms","prefix":"","request":"header: txn: success:> failure: >>","response":"size:16"} 2026-03-13T12:41:47.803943977Z {"level":"info","ts":"2026-03-13T12:41:47.803917Z","caller":"traceutil/trace.go:171","msg":"trace[2055366289] linearizableReadLoop","detail":"{readStateIndex:11492; appliedIndex:11491; }","duration":"221.104933ms","start":"2026-03-13T12:41:47.582802Z","end":"2026-03-13T12:41:47.803907Z","steps":["trace[2055366289] 'read index received' (duration: 3.051547ms)","trace[2055366289] 'applied index is now lower than readState.Index' (duration: 218.050636ms)"],"step_count":2} 2026-03-13T12:41:47.804224314Z {"level":"info","ts":"2026-03-13T12:41:47.804184Z","caller":"traceutil/trace.go:171","msg":"trace[623523628] transaction","detail":"{read_only:false; response_revision:10960; number_of_response:1; }","duration":"223.646587ms","start":"2026-03-13T12:41:47.580531Z","end":"2026-03-13T12:41:47.804177Z","steps":["trace[623523628] 'compare' (duration: 217.649096ms)"],"step_count":1} 2026-03-13T12:41:47.805115336Z {"level":"warn","ts":"2026-03-13T12:41:47.805047Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"222.209201ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/validatingwebhookconfigurations\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-13T12:41:47.805162468Z {"level":"info","ts":"2026-03-13T12:41:47.805119Z","caller":"traceutil/trace.go:171","msg":"trace[2023524135] range","detail":"{range_begin:/kubernetes.io/validatingwebhookconfigurations; range_end:; response_count:0; response_revision:10960; }","duration":"222.324174ms","start":"2026-03-13T12:41:47.582781Z","end":"2026-03-13T12:41:47.805105Z","steps":["trace[2023524135] 'agreement among raft nodes before linearized reading' (duration: 222.17027ms)"],"step_count":1} 2026-03-13T12:41:47.805311021Z {"level":"warn","ts":"2026-03-13T12:41:47.805255Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"216.6374ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-insights/prometheus-k8s\" ","response":"range_response_count:1 size:1136"} 2026-03-13T12:41:47.805311021Z {"level":"info","ts":"2026-03-13T12:41:47.805285Z","caller":"traceutil/trace.go:171","msg":"trace[724000010] range","detail":"{range_begin:/kubernetes.io/roles/openshift-insights/prometheus-k8s; range_end:; response_count:1; response_revision:10960; }","duration":"216.697941ms","start":"2026-03-13T12:41:47.588577Z","end":"2026-03-13T12:41:47.805275Z","steps":["trace[724000010] 'agreement among raft nodes before linearized reading' (duration: 216.63752ms)"],"step_count":1} 2026-03-13T12:41:47.805311021Z {"level":"info","ts":"2026-03-13T12:41:47.805286Z","caller":"traceutil/trace.go:171","msg":"trace[406637404] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/; range_end:/kubernetes.io/config.openshift.io/clusterversions0; response_count:0; response_revision:10960; }","duration":"133.712158ms","start":"2026-03-13T12:41:47.671563Z","end":"2026-03-13T12:41:47.805275Z","steps":["trace[406637404] 'agreement among raft nodes before linearized reading' (duration: 133.691888ms)"],"step_count":1} 2026-03-13T12:41:47.805448155Z {"level":"info","ts":"2026-03-13T12:41:47.805412Z","caller":"traceutil/trace.go:171","msg":"trace[627451306] range","detail":"{range_begin:/kubernetes.io/horizontalpodautoscalers/; range_end:/kubernetes.io/horizontalpodautoscalers0; response_count:0; response_revision:10960; }","duration":"162.416636ms","start":"2026-03-13T12:41:47.642987Z","end":"2026-03-13T12:41:47.805404Z","steps":["trace[627451306] 'agreement among raft nodes before linearized reading' (duration: 162.398715ms)"],"step_count":1} 2026-03-13T12:41:49.361592376Z {"level":"info","ts":"2026-03-13T12:41:49.361466Z","caller":"traceutil/trace.go:171","msg":"trace[1372359864] linearizableReadLoop","detail":"{readStateIndex:11536; appliedIndex:11535; }","duration":"123.224363ms","start":"2026-03-13T12:41:49.238209Z","end":"2026-03-13T12:41:49.361434Z","steps":["trace[1372359864] 'read index received' (duration: 12.774314ms)","trace[1372359864] 'applied index is now lower than readState.Index' (duration: 110.449229ms)"],"step_count":2} 2026-03-13T12:41:49.361592376Z {"level":"info","ts":"2026-03-13T12:41:49.361478Z","caller":"traceutil/trace.go:171","msg":"trace[1154508573] transaction","detail":"{read_only:false; response_revision:11001; number_of_response:1; }","duration":"123.284264ms","start":"2026-03-13T12:41:49.238163Z","end":"2026-03-13T12:41:49.361447Z","steps":["trace[1154508573] 'process raft request' (duration: 12.873756ms)","trace[1154508573] 'compare' (duration: 110.162022ms)"],"step_count":2} 2026-03-13T12:41:49.361809703Z {"level":"info","ts":"2026-03-13T12:41:49.361767Z","caller":"traceutil/trace.go:171","msg":"trace[457464762] range","detail":"{range_begin:/kubernetes.io/roles/openshift/copied-csv-viewer; range_end:; response_count:1; response_revision:11001; }","duration":"123.571851ms","start":"2026-03-13T12:41:49.238181Z","end":"2026-03-13T12:41:49.361753Z","steps":["trace[457464762] 'agreement among raft nodes before linearized reading' (duration: 123.49704ms)"],"step_count":1} 2026-03-13T12:41:49.361880685Z {"level":"info","ts":"2026-03-13T12:41:49.361840Z","caller":"traceutil/trace.go:171","msg":"trace[116752939] range","detail":"{range_begin:/kubernetes.io/clusterroles/machine-api-controllers-metal3-remediation; range_end:; response_count:1; response_revision:11001; }","duration":"123.380697ms","start":"2026-03-13T12:41:49.238451Z","end":"2026-03-13T12:41:49.361832Z","steps":["trace[116752939] 'agreement among raft nodes before linearized reading' (duration: 123.350547ms)"],"step_count":1} 2026-03-13T12:41:49.361880685Z {"level":"info","ts":"2026-03-13T12:41:49.361847Z","caller":"traceutil/trace.go:171","msg":"trace[765108493] range","detail":"{range_begin:/kubernetes.io/pods/openshift-etcd-operator/etcd-operator-5884b9cd56-hjzms; range_end:; response_count:1; response_revision:11001; }","duration":"123.272645ms","start":"2026-03-13T12:41:49.238564Z","end":"2026-03-13T12:41:49.361836Z","steps":["trace[765108493] 'agreement among raft nodes before linearized reading' (duration: 123.245834ms)"],"step_count":1} 2026-03-13T12:41:49.361988377Z {"level":"info","ts":"2026-03-13T12:41:49.361890Z","caller":"traceutil/trace.go:171","msg":"trace[427831335] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators/operator-lifecycle-manager-packageserver; range_end:; response_count:1; response_revision:11001; }","duration":"123.415098ms","start":"2026-03-13T12:41:49.238434Z","end":"2026-03-13T12:41:49.361849Z","steps":["trace[427831335] 'agreement among raft nodes before linearized reading' (duration: 123.295744ms)"],"step_count":1} 2026-03-13T12:41:49.361988377Z {"level":"info","ts":"2026-03-13T12:41:49.361772Z","caller":"traceutil/trace.go:171","msg":"trace[1845709533] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/operatorgroups; range_end:; response_count:0; response_revision:11001; }","duration":"123.378527ms","start":"2026-03-13T12:41:49.238380Z","end":"2026-03-13T12:41:49.361759Z","steps":["trace[1845709533] 'agreement among raft nodes before linearized reading' (duration: 123.360606ms)"],"step_count":1} 2026-03-13T12:41:49.362162512Z {"level":"info","ts":"2026-03-13T12:41:49.361782Z","caller":"traceutil/trace.go:171","msg":"trace[1279922215] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:11001; }","duration":"123.275934ms","start":"2026-03-13T12:41:49.238498Z","end":"2026-03-13T12:41:49.361774Z","steps":["trace[1279922215] 'agreement among raft nodes before linearized reading' (duration: 123.245463ms)"],"step_count":1} 2026-03-13T12:41:49.362278344Z {"level":"info","ts":"2026-03-13T12:41:49.361790Z","caller":"traceutil/trace.go:171","msg":"trace[1526174516] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook; range_end:; response_count:1; response_revision:11001; }","duration":"123.53108ms","start":"2026-03-13T12:41:49.238246Z","end":"2026-03-13T12:41:49.361777Z","steps":["trace[1526174516] 'agreement among raft nodes before linearized reading' (duration: 123.450788ms)"],"step_count":1} 2026-03-13T12:41:49.362356846Z {"level":"info","ts":"2026-03-13T12:41:49.361766Z","caller":"traceutil/trace.go:171","msg":"trace[1006446517] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:11001; }","duration":"123.286564ms","start":"2026-03-13T12:41:49.238459Z","end":"2026-03-13T12:41:49.361746Z","steps":["trace[1006446517] 'agreement among raft nodes before linearized reading' (duration: 123.220783ms)"],"step_count":1} 2026-03-13T12:41:49.362558201Z {"level":"info","ts":"2026-03-13T12:41:49.362503Z","caller":"traceutil/trace.go:171","msg":"trace[726263449] range","detail":"{range_begin:/kubernetes.io/machineconfiguration.openshift.io/machineconfigs; range_end:; response_count:0; response_revision:11001; }","duration":"123.914221ms","start":"2026-03-13T12:41:49.238543Z","end":"2026-03-13T12:41:49.362457Z","steps":["trace[726263449] 'agreement among raft nodes before linearized reading' (duration: 123.8904ms)"],"step_count":1} 2026-03-13T12:41:49.691940778Z {"level":"info","ts":"2026-03-13T12:41:49.691876Z","caller":"traceutil/trace.go:171","msg":"trace[749649130] transaction","detail":"{read_only:false; response_revision:11003; number_of_response:1; }","duration":"115.095927ms","start":"2026-03-13T12:41:49.576765Z","end":"2026-03-13T12:41:49.691861Z","steps":["trace[749649130] 'process raft request' (duration: 71.888381ms)","trace[749649130] 'compare' (duration: 42.918988ms)"],"step_count":2} 2026-03-13T12:41:49.692245676Z {"level":"info","ts":"2026-03-13T12:41:49.692223Z","caller":"traceutil/trace.go:171","msg":"trace[1832136748] transaction","detail":"{read_only:false; response_revision:11004; number_of_response:1; }","duration":"111.447563ms","start":"2026-03-13T12:41:49.580769Z","end":"2026-03-13T12:41:49.692216Z","steps":["trace[1832136748] 'process raft request' (duration: 110.950321ms)"],"step_count":1} 2026-03-13T12:41:49.692464541Z {"level":"info","ts":"2026-03-13T12:41:49.692399Z","caller":"traceutil/trace.go:171","msg":"trace[1548466698] range","detail":"{range_begin:/kubernetes.io/apiregistration.k8s.io/apiservices/v1.quota.openshift.io; range_end:; response_count:1; response_revision:11004; }","duration":"117.781815ms","start":"2026-03-13T12:41:49.574585Z","end":"2026-03-13T12:41:49.692367Z","steps":["trace[1548466698] 'agreement among raft nodes before linearized reading' (duration: 117.712513ms)"],"step_count":1} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715155003025023116 0ustar00000000000000002026-03-13T12:38:47.036395165Z Fixing etcd log permissions.Fixing etcd auto backup permissions.machine-api-operator_current.log0000640000000000000000000002544615155003025033421 0ustar0000000000000000config/pod/openshift-machine-api/logs/machine-api-operator-84bf6db4f9-mjxcz2026-03-13T12:41:23.154664791Z I0313 12:41:23.154430 1 start.go:72] Version: 4.18.0-202602132343.p2.g609dbab.assembly.stream.el9 2026-03-13T12:41:23.155150032Z I0313 12:41:23.155107 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T12:41:23.495354830Z I0313 12:41:23.495276 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/machine-api-operator... 2026-03-13T12:41:25.431773582Z I0313 12:41:25.431721 1 leaderelection.go:268] successfully acquired lease openshift-machine-api/machine-api-operator 2026-03-13T12:41:26.022023249Z I0313 12:41:26.021957 1 operator.go:217] Starting Machine API Operator 2026-03-13T12:41:26.022117261Z I0313 12:41:26.022088 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T12:41:26.022117261Z I0313 12:41:26.022103 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T12:41:26.022127641Z I0313 12:41:26.022119 1 reflector.go:305] Starting reflector *v1.DaemonSet (12m12.981320276s) from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:41:26.022168372Z I0313 12:41:26.022126 1 reflector.go:341] Listing and watching *v1.DaemonSet from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:41:26.022550251Z I0313 12:41:26.022468 1 reflector.go:305] Starting reflector *v1.Proxy (10m5.14071668s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-13T12:41:26.022550251Z I0313 12:41:26.022483 1 reflector.go:341] Listing and watching *v1.Proxy from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-13T12:41:26.022550251Z I0313 12:41:26.022491 1 reflector.go:305] Starting reflector *v1.FeatureGate (10m5.14071668s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-13T12:41:26.022550251Z I0313 12:41:26.022513 1 reflector.go:341] Listing and watching *v1.FeatureGate from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-13T12:41:26.022830709Z I0313 12:41:26.022804 1 reflector.go:305] Starting reflector *v1beta1.Machine (13m6.440485315s) from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-13T12:41:26.022830709Z I0313 12:41:26.022821 1 reflector.go:341] Listing and watching *v1beta1.Machine from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-13T12:41:26.022925071Z I0313 12:41:26.022908 1 reflector.go:305] Starting reflector *v1.ValidatingWebhookConfiguration (12m12.981320276s) from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:41:26.022925071Z I0313 12:41:26.022919 1 reflector.go:341] Listing and watching *v1.ValidatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:41:26.023285080Z I0313 12:41:26.023246 1 reflector.go:305] Starting reflector *v1beta1.MachineSet (13m6.440485315s) from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-13T12:41:26.023285080Z I0313 12:41:26.023258 1 reflector.go:341] Listing and watching *v1beta1.MachineSet from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-13T12:41:26.023302081Z I0313 12:41:26.023273 1 reflector.go:305] Starting reflector *v1.MutatingWebhookConfiguration (12m12.981320276s) from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:41:26.023302081Z I0313 12:41:26.023294 1 reflector.go:341] Listing and watching *v1.MutatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:41:26.023413193Z I0313 12:41:26.023384 1 reflector.go:305] Starting reflector *v1.ClusterVersion (10m5.14071668s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-13T12:41:26.023435384Z I0313 12:41:26.023429 1 reflector.go:341] Listing and watching *v1.ClusterVersion from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-13T12:41:26.034116829Z I0313 12:41:26.034032 1 reflector.go:305] Starting reflector *v1.ClusterOperator (10m5.14071668s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-13T12:41:26.034221642Z I0313 12:41:26.034207 1 reflector.go:341] Listing and watching *v1.ClusterOperator from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-13T12:41:26.040105198Z I0313 12:41:26.039725 1 reflector.go:305] Starting reflector *v1.Deployment (12m12.981320276s) from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:41:26.040105198Z I0313 12:41:26.039862 1 reflector.go:341] Listing and watching *v1.Deployment from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:41:26.041644976Z I0313 12:41:26.041607 1 reflector.go:368] Caches populated for *v1.FeatureGate from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-13T12:41:26.042421205Z I0313 12:41:26.042356 1 reflector.go:368] Caches populated for *v1.ValidatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:41:26.042764564Z I0313 12:41:26.042734 1 reflector.go:368] Caches populated for *v1.ClusterVersion from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-13T12:41:26.043180724Z I0313 12:41:26.043128 1 reflector.go:368] Caches populated for *v1.DaemonSet from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:41:26.043256456Z I0313 12:41:26.043231 1 reflector.go:368] Caches populated for *v1.Proxy from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-13T12:41:26.044748233Z I0313 12:41:26.043905 1 reflector.go:368] Caches populated for *v1beta1.MachineSet from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-13T12:41:26.044748233Z I0313 12:41:26.044599 1 reflector.go:368] Caches populated for *v1beta1.Machine from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-13T12:41:26.053625613Z I0313 12:41:26.052775 1 reflector.go:368] Caches populated for *v1.MutatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:41:26.080534782Z I0313 12:41:26.079870 1 reflector.go:368] Caches populated for *v1.Deployment from k8s.io/client-go/informers/factory.go:160 2026-03-13T12:41:26.087368462Z I0313 12:41:26.087310 1 reflector.go:368] Caches populated for *v1.ClusterOperator from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-13T12:41:26.126278937Z I0313 12:41:26.123378 1 operator.go:229] Synced up caches 2026-03-13T12:41:26.126278937Z I0313 12:41:26.123411 1 operator.go:234] Started feature gate accessor 2026-03-13T12:41:26.126278937Z I0313 12:41:26.123434 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2026-03-13T12:41:26.126278937Z I0313 12:41:26.124063 1 start.go:121] Synced up machine api informer caches 2026-03-13T12:41:26.127894658Z I0313 12:41:26.127843 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-machine-api", Name:"machine-api-operator", UID:"ffd92c43-1c15-4da2-bda3-7c81df6ef45d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'FeatureGatesInitialized' FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}} 2026-03-13T12:41:28.971631260Z I0313 12:41:28.970062 1 status.go:63] Syncing status: progressing 2026-03-13T12:41:28.971631260Z I0313 12:41:28.970558 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterOperator", Namespace:"", Name:"machine-api", UID:"6e21a18e-7897-42d1-b9bd-c3436cf975f3", APIVersion:"config.openshift.io/v1", ResourceVersion:"10704", FieldPath:""}): type: 'Normal' reason: 'Status upgrade' Progressing towards operator: 4.18.34 2026-03-13T12:41:29.268003878Z I0313 12:41:29.267958 1 sync.go:77] Provider is NoOp, skipping synchronisation 2026-03-13T12:41:29.282071247Z I0313 12:41:29.282029 1 status.go:99] Syncing status: available 2026-03-13T12:41:29.328395128Z I0313 12:41:29.328356 1 status.go:69] Syncing status: re-syncing 2026-03-13T12:41:29.334701005Z I0313 12:41:29.334664 1 sync.go:77] Provider is NoOp, skipping synchronisation 2026-03-13T12:41:29.337568376Z I0313 12:41:29.337533 1 status.go:99] Syncing status: available kube-rbac-proxy_current.log0000640000000000000000000001524715155003025032425 0ustar0000000000000000config/pod/openshift-machine-api/logs/machine-api-operator-84bf6db4f9-mjxcz2026-03-13T12:40:47.266629992Z I0313 12:40:47.266429 1 flags.go:64] FLAG: --add-dir-header="false" 2026-03-13T12:40:47.266629992Z I0313 12:40:47.266581 1 flags.go:64] FLAG: --allow-paths="[]" 2026-03-13T12:40:47.266629992Z I0313 12:40:47.266588 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-03-13T12:40:47.266629992Z I0313 12:40:47.266592 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-03-13T12:40:47.266629992Z I0313 12:40:47.266596 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-03-13T12:40:47.266629992Z I0313 12:40:47.266602 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-03-13T12:40:47.266629992Z I0313 12:40:47.266605 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-03-13T12:40:47.266629992Z I0313 12:40:47.266609 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-03-13T12:40:47.266629992Z I0313 12:40:47.266619 1 flags.go:64] FLAG: --client-ca-file="" 2026-03-13T12:40:47.266629992Z I0313 12:40:47.266622 1 flags.go:64] FLAG: --config-file="/etc/kube-rbac-proxy/config-file.yaml" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266626 1 flags.go:64] FLAG: --help="false" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266632 1 flags.go:64] FLAG: --http2-disable="false" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266636 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266646 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266649 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266654 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266664 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266670 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266674 1 flags.go:64] FLAG: --kubeconfig="" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266678 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266681 1 flags.go:64] FLAG: --log-dir="" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266685 1 flags.go:64] FLAG: --log-file="" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266688 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266700 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266705 1 flags.go:64] FLAG: --logtostderr="true" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266709 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266712 1 flags.go:64] FLAG: --oidc-clientID="" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266716 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266719 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266723 1 flags.go:64] FLAG: --oidc-issuer="" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266726 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266733 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266737 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266741 1 flags.go:64] FLAG: --one-output="false" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266745 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266748 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:8443" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266752 1 flags.go:64] FLAG: --skip-headers="false" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266755 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266759 1 flags.go:64] FLAG: --stderrthreshold="" 2026-03-13T12:40:47.266772629Z I0313 12:40:47.266762 1 flags.go:64] FLAG: --tls-cert-file="/etc/tls/private/tls.crt" 2026-03-13T12:40:47.266799611Z I0313 12:40:47.266766 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]" 2026-03-13T12:40:47.266799611Z I0313 12:40:47.266777 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-03-13T12:40:47.266799611Z I0313 12:40:47.266782 1 flags.go:64] FLAG: --tls-private-key-file="/etc/tls/private/tls.key" 2026-03-13T12:40:47.266799611Z I0313 12:40:47.266786 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-03-13T12:40:47.266799611Z I0313 12:40:47.266791 1 flags.go:64] FLAG: --upstream="http://localhost:8080/" 2026-03-13T12:40:47.266810421Z I0313 12:40:47.266804 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-03-13T12:40:47.266819092Z I0313 12:40:47.266808 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-03-13T12:40:47.266819092Z I0313 12:40:47.266813 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-03-13T12:40:47.266828002Z I0313 12:40:47.266817 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-03-13T12:40:47.266828002Z I0313 12:40:47.266821 1 flags.go:64] FLAG: --v="3" 2026-03-13T12:40:47.266836763Z I0313 12:40:47.266825 1 flags.go:64] FLAG: --version="false" 2026-03-13T12:40:47.266836763Z I0313 12:40:47.266830 1 flags.go:64] FLAG: --vmodule="" 2026-03-13T12:40:47.266865394Z W0313 12:40:47.266844 1 deprecated.go:66] 2026-03-13T12:40:47.266865394Z ==== Removed Flag Warning ====================== 2026-03-13T12:40:47.266865394Z 2026-03-13T12:40:47.266865394Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-13T12:40:47.266865394Z 2026-03-13T12:40:47.266865394Z =============================================== 2026-03-13T12:40:47.266865394Z 2026-03-13T12:40:47.266865394Z I0313 12:40:47.266861 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-03-13T12:40:47.268685325Z I0313 12:40:47.267892 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-13T12:40:47.269325096Z I0313 12:40:47.269280 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-13T12:40:47.270589340Z I0313 12:40:47.270359 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-13T12:40:47.270707035Z I0313 12:40:47.270627 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 control-plane-machine-set-operator_current.log0000640000000000000000000002642615155003025040575 0ustar0000000000000000config/pod/openshift-machine-api/logs/control-plane-machine-set-operator-6686554ddc-btz8w2026-03-13T12:41:23.228921194Z I0313 12:41:23.228735 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T12:41:23.234644276Z I0313 12:41:23.234604 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2026-03-13T12:41:23.242908332Z I0313 12:41:23.242836 1 recorder_logging.go:44] &Event{ObjectMeta:{dummy.189c6712b0568668 dummy 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:dummy,Name:dummy,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:FeatureGatesInitialized,Message:FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}},Source:EventSource{Component:,Host:,},FirstTimestamp:2026-03-13 12:41:23.242665576 +0000 UTC m=+0.297419407,LastTimestamp:2026-03-13 12:41:23.242665576 +0000 UTC m=+0.297419407,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,} 2026-03-13T12:41:23.242948213Z I0313 12:41:23.242909 1 main.go:175] FeatureGates initialized: [AWSEFSDriverVolumeMetrics AdminNetworkPolicy AlibabaPlatform AzureWorkloadIdentity BareMetalLoadBalancer BuildCSIVolumes ChunkSizeMiB CloudDualStackNodeIPs DisableKubeletCloudCredentialProviders GCPLabelsTags HardwareSpeed IngressControllerLBSubnetsAWS KMSv1 ManagedBootImages ManagedBootImagesAWS MultiArchInstallAWS MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy OnClusterBuild PersistentIPsForVirtualization PrivateHostedZoneAWS SetEIPForNLBIngressController StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy AWSClusterHostedDNS AdditionalRoutingCapabilities AutomatedEtcdBackup BootcNodeManagement CSIDriverSharedResource ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GatewayAPI ImageStreamImportMode IngressControllerDynamicConfigurationManager InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAzure NodeSwap NutanixMultiSubnets OVNObservability OpenShiftPodSecurityAdmission PinnedImages PlatformOperators ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SignatureStores SigstoreImageVerification TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereMultiNetworks VolumeAttributesClass VolumeGroupSnapshot] 2026-03-13T12:41:23.243223489Z I0313 12:41:23.243193 1 webhook.go:186] "skip registering a mutating webhook, object does not implement admission.Defaulter or WithDefaulter wasn't called" logger="controller-runtime.builder" GVK="machine.openshift.io/v1, Kind=ControlPlaneMachineSet" 2026-03-13T12:41:23.243258790Z I0313 12:41:23.243240 1 webhook.go:202] "Registering a validating webhook" logger="controller-runtime.builder" GVK="machine.openshift.io/v1, Kind=ControlPlaneMachineSet" path="/validate-machine-openshift-io-v1-controlplanemachineset" 2026-03-13T12:41:23.243341642Z I0313 12:41:23.243318 1 server.go:183] "Registering webhook" logger="controller-runtime.webhook" path="/validate-machine-openshift-io-v1-controlplanemachineset" 2026-03-13T12:41:23.243378153Z I0313 12:41:23.243359 1 main.go:230] "starting manager" logger="setup" 2026-03-13T12:41:23.243630860Z I0313 12:41:23.243604 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" 2026-03-13T12:41:23.243794234Z I0313 12:41:23.243753 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false 2026-03-13T12:41:23.243794234Z I0313 12:41:23.243771 1 server.go:83] "starting server" name="health probe" addr="[::]:8081" 2026-03-13T12:41:23.243809494Z I0313 12:41:23.243793 1 server.go:191] "Starting webhook server" logger="controller-runtime.webhook" 2026-03-13T12:41:23.244039640Z I0313 12:41:23.243998 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/control-plane-machine-set-leader... 2026-03-13T12:41:23.244149173Z I0313 12:41:23.244115 1 certwatcher.go:161] "Updated current TLS certificate" logger="controller-runtime.certwatcher" 2026-03-13T12:41:23.244271936Z I0313 12:41:23.244244 1 server.go:242] "Serving webhook server" logger="controller-runtime.webhook" host="" port=9443 2026-03-13T12:41:23.244290906Z I0313 12:41:23.244279 1 certwatcher.go:115] "Starting certificate watcher" logger="controller-runtime.certwatcher" 2026-03-13T12:41:25.196725726Z I0313 12:41:25.196015 1 leaderelection.go:268] successfully acquired lease openshift-machine-api/control-plane-machine-set-leader 2026-03-13T12:41:25.198768317Z I0313 12:41:25.196791 1 recorder.go:104] "control-plane-machine-set-operator-6686554ddc-btz8w_0a779534-040c-4d66-acfc-e4fb0aa01b7b became leader" logger="events" type="Normal" object={"kind":"Lease","namespace":"openshift-machine-api","name":"control-plane-machine-set-leader","uid":"4c9e5750-68fd-47cf-844e-f50805912132","apiVersion":"coordination.k8s.io/v1","resourceVersion":"10617"} reason="LeaderElection" 2026-03-13T12:41:25.198768317Z I0313 12:41:25.197199 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.ControlPlaneMachineSet" 2026-03-13T12:41:25.198768317Z I0313 12:41:25.197237 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1beta1.Machine" 2026-03-13T12:41:25.198768317Z I0313 12:41:25.197255 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.Node" 2026-03-13T12:41:25.198768317Z I0313 12:41:25.197272 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.ClusterOperator" 2026-03-13T12:41:25.199118585Z I0313 12:41:25.198866 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.Infrastructure" 2026-03-13T12:41:25.199118585Z I0313 12:41:25.198892 1 controller.go:183] "Starting Controller" controller="controlplanemachineset" 2026-03-13T12:41:25.201750641Z I0313 12:41:25.199591 1 controller.go:175] "Starting EventSource" controller="controlplanemachinesetgenerator" source="kind source: *v1.ControlPlaneMachineSet" 2026-03-13T12:41:25.201750641Z I0313 12:41:25.199640 1 controller.go:175] "Starting EventSource" controller="controlplanemachinesetgenerator" source="kind source: *v1beta1.Machine" 2026-03-13T12:41:25.201750641Z I0313 12:41:25.199839 1 controller.go:183] "Starting Controller" controller="controlplanemachinesetgenerator" 2026-03-13T12:41:25.572943568Z I0313 12:41:25.572882 1 controller.go:217] "Starting workers" controller="controlplanemachineset" worker count=1 2026-03-13T12:41:25.573013479Z I0313 12:41:25.572956 1 controller.go:170] "Reconciling control plane machine set" controller="controlplanemachineset" reconcileID="02ab1321-1fa4-4744-bf3d-06ca233a3a7b" namespace="openshift-machine-api" name="cluster" 2026-03-13T12:41:25.573067331Z I0313 12:41:25.573043 1 controller.go:178] "No control plane machine set found, setting operator status available" controller="controlplanemachineset" reconcileID="02ab1321-1fa4-4744-bf3d-06ca233a3a7b" namespace="openshift-machine-api" name="cluster" 2026-03-13T12:41:25.579559802Z I0313 12:41:25.579500 1 controller.go:217] "Starting workers" controller="controlplanemachinesetgenerator" worker count=1 2026-03-13T12:41:26.002494274Z I0313 12:41:26.000078 1 controller.go:184] "Finished reconciling control plane machine set" controller="controlplanemachineset" reconcileID="02ab1321-1fa4-4744-bf3d-06ca233a3a7b" namespace="openshift-machine-api" name="cluster" 2026-03-13T12:41:26.002494274Z I0313 12:41:26.000174 1 controller.go:170] "Reconciling control plane machine set" controller="controlplanemachineset" reconcileID="62109bdb-9208-4d38-9657-a0380b69db17" namespace="openshift-machine-api" name="cluster" 2026-03-13T12:41:26.002494274Z I0313 12:41:26.000204 1 controller.go:178] "No control plane machine set found, setting operator status available" controller="controlplanemachineset" reconcileID="62109bdb-9208-4d38-9657-a0380b69db17" namespace="openshift-machine-api" name="cluster" 2026-03-13T12:41:26.002494274Z I0313 12:41:26.000227 1 controller.go:184] "Finished reconciling control plane machine set" controller="controlplanemachineset" reconcileID="62109bdb-9208-4d38-9657-a0380b69db17" namespace="openshift-machine-api" name="cluster" baremetal-kube-rbac-proxy_current.log0000640000000000000000000001552515155003025035340 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-baremetal-operator-5cdb4c5598-l6jp52026-03-13T12:41:23.611972956Z I0313 12:41:23.611460 1 flags.go:64] FLAG: --add-dir-header="false" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611604 1 flags.go:64] FLAG: --allow-paths="[]" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611614 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611618 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611622 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611640 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611644 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611648 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611653 1 flags.go:64] FLAG: --client-ca-file="" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611657 1 flags.go:64] FLAG: --config-file="/etc/baremetal-kube-rbac-proxy/config-file.yaml" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611662 1 flags.go:64] FLAG: --help="false" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611665 1 flags.go:64] FLAG: --http2-disable="false" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611669 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611674 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611677 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611683 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611686 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611691 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611696 1 flags.go:64] FLAG: --kubeconfig="" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611700 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611703 1 flags.go:64] FLAG: --log-dir="" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611707 1 flags.go:64] FLAG: --log-file="" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611711 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611715 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611720 1 flags.go:64] FLAG: --logtostderr="true" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611724 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611727 1 flags.go:64] FLAG: --oidc-clientID="" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611743 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611748 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611751 1 flags.go:64] FLAG: --oidc-issuer="" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611755 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611771 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611775 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611779 1 flags.go:64] FLAG: --one-output="false" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611783 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611786 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:8443" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611790 1 flags.go:64] FLAG: --skip-headers="false" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611794 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611798 1 flags.go:64] FLAG: --stderrthreshold="" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611801 1 flags.go:64] FLAG: --tls-cert-file="/etc/tls/private/tls.crt" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611805 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611815 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611820 1 flags.go:64] FLAG: --tls-private-key-file="/etc/tls/private/tls.key" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611824 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611829 1 flags.go:64] FLAG: --upstream="http://localhost:8080/" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611833 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611837 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611840 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611844 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611847 1 flags.go:64] FLAG: --v="10" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611852 1 flags.go:64] FLAG: --version="false" 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611858 1 flags.go:64] FLAG: --vmodule="" 2026-03-13T12:41:23.611972956Z W0313 12:41:23.611871 1 deprecated.go:66] 2026-03-13T12:41:23.611972956Z ==== Removed Flag Warning ====================== 2026-03-13T12:41:23.611972956Z 2026-03-13T12:41:23.611972956Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-13T12:41:23.611972956Z 2026-03-13T12:41:23.611972956Z =============================================== 2026-03-13T12:41:23.611972956Z 2026-03-13T12:41:23.611972956Z I0313 12:41:23.611882 1 kube-rbac-proxy.go:530] Reading config file: /etc/baremetal-kube-rbac-proxy/config-file.yaml 2026-03-13T12:41:23.612605132Z I0313 12:41:23.612574 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-13T12:41:23.614458587Z I0313 12:41:23.614429 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-13T12:41:23.614542819Z I0313 12:41:23.614519 1 reloader.go:99] reloading key /etc/tls/private/tls.key certificate /etc/tls/private/tls.crt 2026-03-13T12:41:23.614757385Z I0313 12:41:23.614729 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-13T12:41:23.617179415Z I0313 12:41:23.617149 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 cluster-baremetal-operator_current.log0000640000000000000000000001323415155003025035633 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-baremetal-operator-5cdb4c5598-l6jp52026-03-13T12:41:24.578229689Z I0313 12:41:24.575087 1 webhook.go:104] WebhookDependenciesReady: everything ready for webhooks 2026-03-13T12:41:26.029257878Z I0313 12:41:26.027399 1 clusteroperator.go:235] "new CO status" reason="WaitingForProvisioningCR" processMessage="" message="Waiting for Provisioning CR on BareMetal Platform" 2026-03-13T12:41:26.060343600Z I0313 12:41:26.060263 1 provisioning_controller.go:651] "Network stack calculation" NetworkStack=1 2026-03-13T12:41:26.079089076Z I0313 12:41:26.078553 1 recorder_logging.go:44] &Event{ObjectMeta:{dummy.189c6713595d0d39 dummy 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:dummy,Name:dummy,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ValidatingWebhookConfigurationCreated,Message:Created ValidatingWebhookConfiguration.admissionregistration.k8s.io/cluster-baremetal-validating-webhook-configuration because it was missing,Source:EventSource{Component:,Host:,},FirstTimestamp:2026-03-13 12:41:26.078442809 +0000 UTC m=+3.159623225,LastTimestamp:2026-03-13 12:41:26.078442809 +0000 UTC m=+3.159623225,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,} 2026-03-13T12:41:26.079089076Z I0313 12:41:26.078711 1 webhook.go:177] "msg"="skip registering a mutating webhook, object does not implement admission.Defaulter or WithDefaulter wasn't called" "GVK"={"Group":"metal3.io","Version":"v1alpha1","Kind":"Provisioning"} "logger"="controller-runtime.builder" 2026-03-13T12:41:26.079089076Z I0313 12:41:26.078762 1 webhook.go:193] "msg"="Registering a validating webhook" "GVK"={"Group":"metal3.io","Version":"v1alpha1","Kind":"Provisioning"} "logger"="controller-runtime.builder" "path"="/validate-metal3-io-v1alpha1-provisioning" 2026-03-13T12:41:26.079089076Z I0313 12:41:26.078838 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-metal3-io-v1alpha1-provisioning" 2026-03-13T12:41:26.080373798Z I0313 12:41:26.080205 1 main.go:180] starting manager 2026-03-13T12:41:26.084449949Z I0313 12:41:26.083947 1 server.go:208] "msg"="Starting metrics server" "logger"="controller-runtime.metrics" 2026-03-13T12:41:26.084449949Z I0313 12:41:26.084372 1 server.go:247] "msg"="Serving metrics server" "bindAddress"=":8080" "logger"="controller-runtime.metrics" "secure"=false 2026-03-13T12:41:26.084449949Z I0313 12:41:26.084442 1 server.go:191] "msg"="Starting webhook server" "logger"="controller-runtime.webhook" 2026-03-13T12:41:26.085029223Z I0313 12:41:26.084743 1 certwatcher.go:161] "msg"="Updated current TLS certificate" "logger"="controller-runtime.certwatcher" 2026-03-13T12:41:26.085029223Z I0313 12:41:26.084830 1 server.go:242] "msg"="Serving webhook server" "host"="" "logger"="controller-runtime.webhook" "port"=9443 2026-03-13T12:41:26.085029223Z I0313 12:41:26.084979 1 certwatcher.go:115] "msg"="Starting certificate watcher" "logger"="controller-runtime.certwatcher" 2026-03-13T12:41:26.234376212Z I0313 12:41:26.234320 1 leaderelection.go:250] attempting to acquire leader lease openshift-machine-api/cluster-baremetal-operator... 2026-03-13T12:41:26.697017239Z I0313 12:41:26.696675 1 leaderelection.go:260] successfully acquired lease openshift-machine-api/cluster-baremetal-operator 2026-03-13T12:41:26.697017239Z I0313 12:41:26.696990 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1alpha1.Provisioning" 2026-03-13T12:41:26.697017239Z I0313 12:41:26.697006 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Secret" 2026-03-13T12:41:26.697102981Z I0313 12:41:26.697018 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Deployment" 2026-03-13T12:41:26.697102981Z I0313 12:41:26.697027 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Service" 2026-03-13T12:41:26.697102981Z I0313 12:41:26.697037 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.DaemonSet" 2026-03-13T12:41:26.697102981Z I0313 12:41:26.697046 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.ClusterOperator" 2026-03-13T12:41:26.697102981Z I0313 12:41:26.697057 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Proxy" 2026-03-13T12:41:26.697102981Z I0313 12:41:26.697068 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1beta1.Machine" 2026-03-13T12:41:26.697102981Z I0313 12:41:26.697077 1 controller.go:181] "msg"="Starting Controller" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" 2026-03-13T12:41:27.411123781Z I0313 12:41:27.410275 1 controller.go:215] "msg"="Starting workers" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "worker count"=1 cluster-autoscaler-operator_current.log0000640000000000000000000002134615155003025036246 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-69576476f7-sqndx2026-03-13T12:41:22.525460737Z I0313 12:41:22.525261 1 main.go:15] Go Version: go1.22.12 (Red Hat 1.22.12-7.el9) X:strictfipsruntime 2026-03-13T12:41:22.525627371Z I0313 12:41:22.525614 1 main.go:16] Go OS/Arch: linux/amd64 2026-03-13T12:41:22.525654072Z I0313 12:41:22.525643 1 main.go:17] Version: cluster-autoscaler-operator v4.18.0-202602132343.p2.g474ad65.assembly.stream.el9+ose-cluster-autoscaler-operator 2026-03-13T12:41:22.526005071Z I0313 12:41:22.525968 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T12:41:22.544905830Z I0313 12:41:22.544851 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-clusterautoscalers" 2026-03-13T12:41:22.544905830Z I0313 12:41:22.544899 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-machineautoscalers" 2026-03-13T12:41:22.545094825Z I0313 12:41:22.545079 1 main.go:41] Starting cluster-autoscaler-operator 2026-03-13T12:41:22.552331395Z I0313 12:41:22.552283 1 server.go:208] "msg"="Starting metrics server" "logger"="controller-runtime.metrics" 2026-03-13T12:41:22.556345094Z I0313 12:41:22.556306 1 server.go:247] "msg"="Serving metrics server" "bindAddress"="127.0.0.1:9191" "logger"="controller-runtime.metrics" "secure"=false 2026-03-13T12:41:22.556374015Z I0313 12:41:22.552839 1 server.go:191] "msg"="Starting webhook server" "logger"="controller-runtime.webhook" 2026-03-13T12:41:22.557008530Z I0313 12:41:22.556982 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/cluster-autoscaler-operator-leader... 2026-03-13T12:41:22.557287057Z I0313 12:41:22.557263 1 certwatcher.go:161] "msg"="Updated current TLS certificate" "logger"="controller-runtime.certwatcher" 2026-03-13T12:41:22.557553224Z I0313 12:41:22.557533 1 server.go:242] "msg"="Serving webhook server" "host"="" "logger"="controller-runtime.webhook" "port"=8443 2026-03-13T12:41:22.557604426Z I0313 12:41:22.557576 1 certwatcher.go:115] "msg"="Starting certificate watcher" "logger"="controller-runtime.certwatcher" 2026-03-13T12:41:22.571074769Z I0313 12:41:22.571025 1 leaderelection.go:268] successfully acquired lease openshift-machine-api/cluster-autoscaler-operator-leader 2026-03-13T12:41:22.574174906Z I0313 12:41:22.573500 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.ClusterAutoscaler" 2026-03-13T12:41:22.574497095Z I0313 12:41:22.574467 1 status.go:341] Starting status reporter: cluster operator informers 2026-03-13T12:41:22.574596747Z I0313 12:41:22.574575 1 controller.go:175] "msg"="Starting EventSource" "controller"="machine_autoscaler_controller" "source"="kind source: *v1beta1.MachineAutoscaler" 2026-03-13T12:41:22.574641319Z I0313 12:41:22.574631 1 controller.go:175] "msg"="Starting EventSource" "controller"="machine_autoscaler_controller" "source"="kind source: *unstructured.Unstructured" 2026-03-13T12:41:22.574674179Z I0313 12:41:22.574665 1 controller.go:183] "msg"="Starting Controller" "controller"="machine_autoscaler_controller" 2026-03-13T12:41:22.576913284Z I0313 12:41:22.576814 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.Deployment" 2026-03-13T12:41:22.578174636Z I0313 12:41:22.576975 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.Service" 2026-03-13T12:41:22.578174636Z I0313 12:41:22.577054 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.ServiceMonitor" 2026-03-13T12:41:22.578174636Z I0313 12:41:22.577095 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.PrometheusRule" 2026-03-13T12:41:22.578174636Z I0313 12:41:22.577112 1 controller.go:183] "msg"="Starting Controller" "controller"="cluster_autoscaler_controller" 2026-03-13T12:41:22.678493607Z I0313 12:41:22.677386 1 status.go:352] Starting status reporter: worker 2026-03-13T12:41:22.681435470Z I0313 12:41:22.681397 1 status.go:437] machine-api-operator not ready yet 2026-03-13T12:41:22.681435470Z W0313 12:41:22.681411 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-13T12:41:22.722315105Z I0313 12:41:22.721362 1 status.go:437] machine-api-operator not ready yet 2026-03-13T12:41:22.722315105Z W0313 12:41:22.721400 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-13T12:41:22.780623743Z I0313 12:41:22.780513 1 controller.go:217] "msg"="Starting workers" "controller"="cluster_autoscaler_controller" "worker count"=1 2026-03-13T12:41:22.780720295Z I0313 12:41:22.780689 1 controller.go:217] "msg"="Starting workers" "controller"="machine_autoscaler_controller" "worker count"=1 2026-03-13T12:41:22.790065348Z I0313 12:41:22.788743 1 webhookconfig.go:72] Webhook configuration status: created 2026-03-13T12:41:25.425969408Z I0313 12:41:25.425923 1 status.go:437] machine-api-operator not ready yet 2026-03-13T12:41:25.426049270Z W0313 12:41:25.426038 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-13T12:41:26.025351071Z I0313 12:41:26.022185 1 status.go:437] machine-api-operator not ready yet 2026-03-13T12:41:26.025351071Z W0313 12:41:26.022204 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-13T12:41:26.058592657Z I0313 12:41:26.058260 1 status.go:437] machine-api-operator not ready yet 2026-03-13T12:41:26.058592657Z W0313 12:41:26.058280 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-13T12:41:26.105549063Z I0313 12:41:26.105476 1 status.go:437] machine-api-operator not ready yet 2026-03-13T12:41:26.105549063Z W0313 12:41:26.105498 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-13T12:41:26.694555818Z I0313 12:41:26.694517 1 status.go:437] machine-api-operator not ready yet 2026-03-13T12:41:26.694602479Z W0313 12:41:26.694591 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-13T12:41:27.905015625Z I0313 12:41:27.904667 1 status.go:437] machine-api-operator not ready yet 2026-03-13T12:41:27.905015625Z W0313 12:41:27.904693 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-13T12:41:28.984364826Z I0313 12:41:28.983008 1 status.go:437] machine-api-operator not ready yet 2026-03-13T12:41:28.984364826Z W0313 12:41:28.983025 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-13T12:41:29.282461658Z I0313 12:41:29.281526 1 status.go:437] machine-api-operator not ready yet 2026-03-13T12:41:29.282461658Z W0313 12:41:29.281551 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-13T12:41:29.300697500Z I0313 12:41:29.300619 1 status.go:450] No ClusterAutoscaler. Reporting available. 2026-03-13T12:41:29.300697500Z I0313 12:41:29.300637 1 status.go:244] Operator status available: at version 4.18.34 2026-03-13T12:41:29.327525797Z I0313 12:41:29.327488 1 status.go:450] No ClusterAutoscaler. Reporting available. 2026-03-13T12:41:29.327525797Z I0313 12:41:29.327504 1 status.go:244] Operator status available: at version 4.18.34 2026-03-13T12:41:29.431120199Z I0313 12:41:29.431072 1 status.go:450] No ClusterAutoscaler. Reporting available. 2026-03-13T12:41:29.431120199Z I0313 12:41:29.431096 1 status.go:244] Operator status available: at version 4.18.34 2026-03-13T12:41:30.163102224Z I0313 12:41:30.163038 1 status.go:450] No ClusterAutoscaler. Reporting available. 2026-03-13T12:41:30.163102224Z I0313 12:41:30.163061 1 status.go:244] Operator status available: at version 4.18.34 2026-03-13T12:41:38.040929538Z I0313 12:41:38.040870 1 status.go:450] No ClusterAutoscaler. Reporting available. 2026-03-13T12:41:38.041014260Z I0313 12:41:38.041000 1 status.go:244] Operator status available: at version 4.18.34 2026-03-13T12:41:46.281398665Z I0313 12:41:46.280169 1 status.go:450] No ClusterAutoscaler. Reporting available. 2026-03-13T12:41:46.281398665Z I0313 12:41:46.280217 1 status.go:244] Operator status available: at version 4.18.34 2026-03-13T12:41:46.308955944Z I0313 12:41:46.307534 1 status.go:450] No ClusterAutoscaler. Reporting available. 2026-03-13T12:41:46.308955944Z I0313 12:41:46.307578 1 status.go:244] Operator status available: at version 4.18.34 kube-rbac-proxy_current.log0000640000000000000000000001524715155003025033611 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-69576476f7-sqndx2026-03-13T12:40:46.836963368Z I0313 12:40:46.836746 1 flags.go:64] FLAG: --add-dir-header="false" 2026-03-13T12:40:46.836963368Z I0313 12:40:46.836926 1 flags.go:64] FLAG: --allow-paths="[]" 2026-03-13T12:40:46.836963368Z I0313 12:40:46.836942 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-03-13T12:40:46.836963368Z I0313 12:40:46.836946 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-03-13T12:40:46.836963368Z I0313 12:40:46.836949 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-03-13T12:40:46.836963368Z I0313 12:40:46.836955 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.836958 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.836963 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.836972 1 flags.go:64] FLAG: --client-ca-file="" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.836975 1 flags.go:64] FLAG: --config-file="/etc/kube-rbac-proxy/config-file.yaml" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.836980 1 flags.go:64] FLAG: --help="false" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.836983 1 flags.go:64] FLAG: --http2-disable="false" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.836987 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.836992 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.836996 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.837004 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.837007 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.837012 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.837017 1 flags.go:64] FLAG: --kubeconfig="" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.837021 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.837024 1 flags.go:64] FLAG: --log-dir="" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.837027 1 flags.go:64] FLAG: --log-file="" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.837031 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.837036 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.837040 1 flags.go:64] FLAG: --logtostderr="true" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.837044 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.837047 1 flags.go:64] FLAG: --oidc-clientID="" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.837051 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.837055 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.837058 1 flags.go:64] FLAG: --oidc-issuer="" 2026-03-13T12:40:46.837074754Z I0313 12:40:46.837061 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-03-13T12:40:46.837089675Z I0313 12:40:46.837072 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-03-13T12:40:46.837089675Z I0313 12:40:46.837076 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-03-13T12:40:46.837089675Z I0313 12:40:46.837080 1 flags.go:64] FLAG: --one-output="false" 2026-03-13T12:40:46.837089675Z I0313 12:40:46.837085 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-03-13T12:40:46.837105735Z I0313 12:40:46.837088 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:9192" 2026-03-13T12:40:46.837105735Z I0313 12:40:46.837092 1 flags.go:64] FLAG: --skip-headers="false" 2026-03-13T12:40:46.837105735Z I0313 12:40:46.837096 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-03-13T12:40:46.837105735Z I0313 12:40:46.837099 1 flags.go:64] FLAG: --stderrthreshold="" 2026-03-13T12:40:46.837121536Z I0313 12:40:46.837103 1 flags.go:64] FLAG: --tls-cert-file="/etc/tls/private/tls.crt" 2026-03-13T12:40:46.837121536Z I0313 12:40:46.837107 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]" 2026-03-13T12:40:46.837129146Z I0313 12:40:46.837120 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-03-13T12:40:46.837129146Z I0313 12:40:46.837125 1 flags.go:64] FLAG: --tls-private-key-file="/etc/tls/private/tls.key" 2026-03-13T12:40:46.837177489Z I0313 12:40:46.837129 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-03-13T12:40:46.837177489Z I0313 12:40:46.837163 1 flags.go:64] FLAG: --upstream="http://127.0.0.1:9191/" 2026-03-13T12:40:46.837177489Z I0313 12:40:46.837168 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-03-13T12:40:46.837177489Z I0313 12:40:46.837172 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-03-13T12:40:46.837189579Z I0313 12:40:46.837177 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-03-13T12:40:46.837189579Z I0313 12:40:46.837182 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-03-13T12:40:46.837189579Z I0313 12:40:46.837186 1 flags.go:64] FLAG: --v="3" 2026-03-13T12:40:46.837197470Z I0313 12:40:46.837190 1 flags.go:64] FLAG: --version="false" 2026-03-13T12:40:46.837204550Z I0313 12:40:46.837196 1 flags.go:64] FLAG: --vmodule="" 2026-03-13T12:40:46.837254113Z W0313 12:40:46.837209 1 deprecated.go:66] 2026-03-13T12:40:46.837254113Z ==== Removed Flag Warning ====================== 2026-03-13T12:40:46.837254113Z 2026-03-13T12:40:46.837254113Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-13T12:40:46.837254113Z 2026-03-13T12:40:46.837254113Z =============================================== 2026-03-13T12:40:46.837254113Z 2026-03-13T12:40:46.837254113Z I0313 12:40:46.837227 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-03-13T12:40:46.837976718Z I0313 12:40:46.837949 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-13T12:40:46.839600320Z I0313 12:40:46.839571 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-13T12:40:46.839973279Z I0313 12:40:46.839911 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9192 2026-03-13T12:40:46.840458183Z I0313 12:40:46.840432 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9192 config/pod/openshift-oauth-apiserver/logs/apiserver-787dbf5bb9-5645n/oauth-apiserver_current.log0000640000000000000000000011372115155003025031172 0ustar00000000000000002026-03-13T12:39:49.346354020Z W0313 12:39:49.346266 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:55.730844048Z W0313 12:39:55.730748 1 logging.go:55] [core] [Channel #39 SubChannel #40]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:56.732766710Z W0313 12:39:56.732686 1 logging.go:55] [core] [Channel #39 SubChannel #40]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:39:58.138868327Z W0313 12:39:58.138769 1 logging.go:55] [core] [Channel #39 SubChannel #40]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:40:00.359745283Z W0313 12:40:00.359617 1 logging.go:55] [core] [Channel #39 SubChannel #40]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T12:40:07.842093572Z E0313 12:40:07.841984 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:07.842188615Z E0313 12:40:07.842171 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:07.842292538Z E0313 12:40:07.842263 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:07.842532983Z E0313 12:40:07.842507 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:07.842544993Z E0313 12:40:07.842529 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:07.849333266Z E0313 12:40:07.848972 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:07.860820015Z E0313 12:40:07.860771 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:07.860928607Z E0313 12:40:07.860913 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:07.861111871Z E0313 12:40:07.861043 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:07.861131741Z E0313 12:40:07.861123 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:07.861251614Z E0313 12:40:07.861237 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:07.866226386Z E0313 12:40:07.863685 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:07.888323713Z E0313 12:40:07.888273 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:07.893108841Z E0313 12:40:07.893034 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:07.910890212Z E0313 12:40:07.910344 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:07.921312926Z E0313 12:40:07.921227 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:11.510631952Z E0313 12:40:11.509392 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:11.510631952Z E0313 12:40:11.509546 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:11.510631952Z E0313 12:40:11.509641 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:11.510631952Z E0313 12:40:11.509546 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:11.510631952Z E0313 12:40:11.509814 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:12.710691582Z E0313 12:40:12.710426 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:12.710691582Z E0313 12:40:12.710637 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:12.710691582Z E0313 12:40:12.710658 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:12.710766874Z E0313 12:40:12.710687 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:12.710828535Z E0313 12:40:12.710429 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:37.830889752Z E0313 12:40:37.830810 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:37.831433669Z E0313 12:40:37.831416 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:37.831716903Z E0313 12:40:37.831700 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:37.831950814Z E0313 12:40:37.831934 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:37.832217148Z E0313 12:40:37.832191 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:37.857347845Z E0313 12:40:37.857296 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:37.857693003Z E0313 12:40:37.857660 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:37.857919764Z E0313 12:40:37.857892 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:37.858118084Z E0313 12:40:37.858091 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:37.858351115Z E0313 12:40:37.858323 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:41.518116693Z E0313 12:40:41.517993 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:41.518465090Z E0313 12:40:41.518429 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:41.518465090Z E0313 12:40:41.518446 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:41.518596627Z E0313 12:40:41.518549 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:41.518688551Z E0313 12:40:41.518658 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:42.716089572Z E0313 12:40:42.714505 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:42.716089572Z E0313 12:40:42.714505 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:42.716089572Z E0313 12:40:42.714754 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:42.716089572Z E0313 12:40:42.714979 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:42.716089572Z E0313 12:40:42.715408 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:40:58.030829470Z I0313 12:40:58.030612 1 policy_source.go:224] refreshing policies 2026-03-13T12:40:59.030886407Z I0313 12:40:59.030812 1 policy_source.go:224] refreshing policies 2026-03-13T12:41:07.840281634Z E0313 12:41:07.840113 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:07.840631234Z E0313 12:41:07.840601 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:07.840794728Z E0313 12:41:07.840770 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:07.840991662Z E0313 12:41:07.840960 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:07.841192467Z E0313 12:41:07.841163 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:07.849642917Z E0313 12:41:07.849585 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:07.850004676Z E0313 12:41:07.849972 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:07.850242831Z E0313 12:41:07.850211 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:07.850460078Z E0313 12:41:07.850429 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:07.850733244Z E0313 12:41:07.850698 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:07.883184050Z E0313 12:41:07.879686 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:07.886691747Z E0313 12:41:07.886653 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:07.935227042Z E0313 12:41:07.935027 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:07.943303433Z E0313 12:41:07.942707 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:11.527197163Z E0313 12:41:11.526871 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:11.527704995Z E0313 12:41:11.527418 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:11.532162826Z E0313 12:41:11.531896 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:11.532162826Z E0313 12:41:11.531933 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:11.534223938Z E0313 12:41:11.532455 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:12.723382785Z E0313 12:41:12.723319 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:12.723382785Z E0313 12:41:12.723339 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:12.723465657Z E0313 12:41:12.723336 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:12.723498058Z E0313 12:41:12.723468 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:12.723537729Z E0313 12:41:12.723323 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.841968446Z E0313 12:41:37.839925 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.845463534Z E0313 12:41:37.845406 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.845821884Z E0313 12:41:37.845772 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.850985864Z E0313 12:41:37.850913 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.850985864Z E0313 12:41:37.850959 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.851209880Z E0313 12:41:37.851124 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:37.851247532Z E0313 12:41:37.851225 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:38.853166369Z E0313 12:41:38.853059 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:38.853300202Z E0313 12:41:38.853248 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:38.853570549Z E0313 12:41:38.853510 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:41.541239933Z E0313 12:41:41.541186 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:41.541618923Z E0313 12:41:41.541584 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:41.541632693Z E0313 12:41:41.541272 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:41.541783257Z E0313 12:41:41.541422 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:41.541939110Z E0313 12:41:41.541499 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:42.727108073Z E0313 12:41:42.727024 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:42.727311768Z E0313 12:41:42.727279 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:42.727395570Z E0313 12:41:42.727024 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:42.727504112Z E0313 12:41:42.727111 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:42.727591975Z E0313 12:41:42.727204 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=135703146201044803, SKID=D1:07:B4:30:DD:F1:9D:0C:32:3F:53:EF:EE:0A:48:8E:50:31:1C:85, AKID=09:61:F3:E8:26:86:8D:2D:48:CE:7A:3E:DA:8F:14:76:0D:77:25:CD failed: x509: certificate signed by unknown authority]" 2026-03-13T12:41:46.903215793Z I0313 12:41:46.902869 1 policy_source.go:224] refreshing policies 2026-03-13T12:41:46.921265219Z I0313 12:41:46.921205 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-13T12:41:46.926025570Z I0313 12:41:46.925968 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 config/pod/openshift-ingress/router-default-79f8cd6fdd-wtf6j.json0000640000000000000000000001533715155003025023404 0ustar0000000000000000{"metadata":{"name":"router-default-79f8cd6fdd-wtf6j","generateName":"router-default-79f8cd6fdd-","namespace":"openshift-ingress","uid":"45925a5e-41ae-4c19-b586-3151c7677612","resourceVersion":"6796","creationTimestamp":"2026-03-13T12:38:15Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"9cb46c8fc","pod-template-hash":"79f8cd6fdd"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-79f8cd6fdd","uid":"23418d29-b2ca-4ebf-b990-cdd8d21bc435","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-tll9d","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-tll9d","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["9cb46c8fc"]}]}}]},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:15Z","reason":"Unschedulable","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000003474315155003025037371 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-7c6989d6c4-tc4ht2026-03-13T12:39:11.678051122Z Copying system trust bundle 2026-03-13T12:39:11.751931403Z W0313 12:39:11.751781 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-03-13T12:39:11.752429554Z I0313 12:39:11.752370 1 observer_polling.go:159] Starting file observer 2026-03-13T12:39:11.753303213Z I0313 12:39:11.753256 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T12:39:11.753392005Z I0313 12:39:11.753339 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T12:39:11.754291815Z I0313 12:39:11.754257 1 observer_polling.go:159] Starting file observer 2026-03-13T12:40:11.767584615Z W0313 12:40:11.767325 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods authentication-operator-7c6989d6c4-tc4ht) 2026-03-13T12:40:11.768101137Z I0313 12:40:11.768054 1 builder.go:304] cluster-authentication-operator version - 2026-03-13T12:40:11.770637674Z I0313 12:40:11.770560 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T12:40:26.847769862Z I0313 12:40:26.847539 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-13T12:40:26.855590604Z I0313 12:40:26.855529 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-13T12:40:26.855590604Z I0313 12:40:26.855557 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-13T12:40:26.855641306Z I0313 12:40:26.855614 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-13T12:40:26.855641306Z I0313 12:40:26.855625 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-13T12:40:26.863004984Z I0313 12:40:26.862962 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T12:40:26.863004984Z W0313 12:40:26.862987 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T12:40:26.863004984Z W0313 12:40:26.862992 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T12:40:26.863004984Z W0313 12:40:26.862997 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T12:40:26.863004984Z W0313 12:40:26.863000 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T12:40:26.863046486Z W0313 12:40:26.863004 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T12:40:26.863046486Z W0313 12:40:26.863007 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T12:40:26.863056447Z I0313 12:40:26.863031 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-13T12:40:26.867580754Z I0313 12:40:26.867447 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T12:40:26.867580754Z I0313 12:40:26.867532 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T12:40:26.867644127Z I0313 12:40:26.867612 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T12:40:26.867644127Z I0313 12:40:26.867626 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T12:40:26.867675429Z I0313 12:40:26.867641 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T12:40:26.867675429Z I0313 12:40:26.867647 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T12:40:26.867813596Z I0313 12:40:26.867766 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773405464\" (2026-03-13 12:37:46 +0000 UTC to 2028-03-12 12:37:47 +0000 UTC (now=2026-03-13 12:40:26.86770169 +0000 UTC))" 2026-03-13T12:40:26.867936112Z I0313 12:40:26.867914 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T12:40:26.867936112Z I0313 12:40:26.867930 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T12:40:26.867983784Z I0313 12:40:26.867958 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773405612\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773405611\" (2026-03-13 11:40:11 +0000 UTC to 2027-03-13 11:40:11 +0000 UTC (now=2026-03-13 12:40:26.867931741 +0000 UTC))" 2026-03-13T12:40:26.868017956Z I0313 12:40:26.868001 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T12:40:26.868068178Z I0313 12:40:26.868047 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-13T12:40:26.868111990Z I0313 12:40:26.868087 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T12:40:26.868355542Z I0313 12:40:26.868303 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T12:40:26.868908641Z I0313 12:40:26.868862 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T12:40:26.869801115Z I0313 12:40:26.869329 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... 2026-03-13T12:40:26.873696560Z I0313 12:40:26.873513 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-13T12:40:26.876191845Z I0313 12:40:26.874007 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-03-13T12:40:26.876191845Z I0313 12:40:26.874282 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-13T12:40:26.968546495Z I0313 12:40:26.968479 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T12:40:26.968725654Z I0313 12:40:26.968698 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T12:40:26.969052780Z I0313 12:40:26.969016 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 12:19:46 +0000 UTC to 2036-03-10 12:19:46 +0000 UTC (now=2026-03-13 12:40:26.968983326 +0000 UTC))" 2026-03-13T12:40:26.969052780Z I0313 12:40:26.969049 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-13 12:26:40 +0000 UTC to 2026-03-14 12:26:40 +0000 UTC (now=2026-03-13 12:40:26.969033919 +0000 UTC))" 2026-03-13T12:40:26.969079351Z I0313 12:40:26.969063 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-13 12:26:40 +0000 UTC to 2027-03-13 12:26:40 +0000 UTC (now=2026-03-13 12:40:26.96905401 +0000 UTC))" 2026-03-13T12:40:26.969086911Z I0313 12:40:26.969079 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-13 12:26:41 +0000 UTC to 2027-03-13 12:26:41 +0000 UTC (now=2026-03-13 12:40:26.969069281 +0000 UTC))" 2026-03-13T12:40:26.969106662Z I0313 12:40:26.969094 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 12:26:38 +0000 UTC to 2036-03-10 12:26:38 +0000 UTC (now=2026-03-13 12:40:26.969084821 +0000 UTC))" 2026-03-13T12:40:26.969308692Z I0313 12:40:26.969282 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773405464\" (2026-03-13 12:37:46 +0000 UTC to 2028-03-12 12:37:47 +0000 UTC (now=2026-03-13 12:40:26.96925551 +0000 UTC))" 2026-03-13T12:40:26.969422068Z I0313 12:40:26.969399 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773405612\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773405611\" (2026-03-13 11:40:11 +0000 UTC to 2027-03-13 11:40:11 +0000 UTC (now=2026-03-13 12:40:26.969386206 +0000 UTC))" 2026-03-13T12:40:26.969422068Z I0313 12:40:26.968455 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T12:40:26.969889312Z I0313 12:40:26.969818 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 12:19:46 +0000 UTC to 2036-03-10 12:19:46 +0000 UTC (now=2026-03-13 12:40:26.969565215 +0000 UTC))" 2026-03-13T12:40:26.969889312Z I0313 12:40:26.969849 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-13 12:26:40 +0000 UTC to 2026-03-14 12:26:40 +0000 UTC (now=2026-03-13 12:40:26.969833739 +0000 UTC))" 2026-03-13T12:40:26.969889312Z I0313 12:40:26.969864 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-13 12:26:40 +0000 UTC to 2027-03-13 12:26:40 +0000 UTC (now=2026-03-13 12:40:26.96985491 +0000 UTC))" 2026-03-13T12:40:26.969889312Z I0313 12:40:26.969878 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-13 12:26:41 +0000 UTC to 2027-03-13 12:26:41 +0000 UTC (now=2026-03-13 12:40:26.969868991 +0000 UTC))" 2026-03-13T12:40:26.969914443Z I0313 12:40:26.969892 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 12:26:38 +0000 UTC to 2036-03-10 12:26:38 +0000 UTC (now=2026-03-13 12:40:26.969883162 +0000 UTC))" 2026-03-13T12:40:26.969914443Z I0313 12:40:26.969905 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-13 12:26:38 +0000 UTC to 2026-03-14 12:26:38 +0000 UTC (now=2026-03-13 12:40:26.969897152 +0000 UTC))" 2026-03-13T12:40:26.970073971Z I0313 12:40:26.970038 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773405464\" (2026-03-13 12:37:46 +0000 UTC to 2028-03-12 12:37:47 +0000 UTC (now=2026-03-13 12:40:26.970016958 +0000 UTC))" 2026-03-13T12:40:26.970178526Z I0313 12:40:26.970161 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773405612\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773405611\" (2026-03-13 11:40:11 +0000 UTC to 2027-03-13 11:40:11 +0000 UTC (now=2026-03-13 12:40:26.970149905 +0000 UTC))" authentication-operator_previous.log0000640000000000000000000004301715155003025037555 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-7c6989d6c4-tc4ht2026-03-13T12:38:37.394571406Z I0313 12:38:37.394549 1 base_controller.go:113] All openshift-authentication-IngressNodesAvailable workers have been terminated 2026-03-13T12:38:37.394571406Z I0313 12:38:37.394373 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionKey ... 2026-03-13T12:38:37.394571406Z I0313 12:38:37.394558 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionKey workers have been terminated 2026-03-13T12:38:37.394571406Z I0313 12:38:37.394380 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionCondition ... 2026-03-13T12:38:37.394593827Z I0313 12:38:37.394572 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionCondition workers have been terminated 2026-03-13T12:38:37.394593827Z E0313 12:38:37.394384 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver\": context canceled" 2026-03-13T12:38:37.394669439Z I0313 12:38:37.394387 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionState controller ... 2026-03-13T12:38:37.394669439Z I0313 12:38:37.394601 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionState workers have been terminated 2026-03-13T12:38:37.394669439Z I0313 12:38:37.394359 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionMigration ... 2026-03-13T12:38:37.394669439Z I0313 12:38:37.394630 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-13T12:38:37.394669439Z I0313 12:38:37.394642 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionMigration workers have been terminated 2026-03-13T12:38:37.394669439Z I0313 12:38:37.394399 1 base_controller.go:181] Shutting down OAuthAPIServerController-WorkloadWorkloadController ... 2026-03-13T12:38:37.394669439Z I0313 12:38:37.394409 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionPrune ... 2026-03-13T12:38:37.394669439Z I0313 12:38:37.394646 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T12:38:37.394669439Z I0313 12:38:37.394655 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T12:38:37.394669439Z E0313 12:38:37.394397 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert\": context canceled" 2026-03-13T12:38:37.394705881Z I0313 12:38:37.394674 1 base_controller.go:181] Shutting down RouterCertsDomainValidationController ... 2026-03-13T12:38:37.394724471Z I0313 12:38:37.394707 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionPrune controller ... 2026-03-13T12:38:37.394724471Z I0313 12:38:37.394714 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionPrune workers have been terminated 2026-03-13T12:38:37.394743702Z I0313 12:38:37.394731 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-13T12:38:37.394761643Z I0313 12:38:37.394750 1 builder.go:335] server exited 2026-03-13T12:38:37.397804413Z I0313 12:38:37.394789 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1108643018/tls.crt::/tmp/serving-cert-1108643018/tls.key" 2026-03-13T12:38:37.397804413Z I0313 12:38:37.394844 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.394860 1 base_controller.go:123] Shutting down worker of RouterCertsDomainValidationController controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.394861 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorController controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.394866 1 base_controller.go:113] All RouterCertsDomainValidationController workers have been terminated 2026-03-13T12:38:37.397804413Z I0313 12:38:37.394868 1 base_controller.go:113] All WebhookAuthenticatorController workers have been terminated 2026-03-13T12:38:37.397804413Z I0313 12:38:37.394936 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.394945 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T12:38:37.397804413Z I0313 12:38:37.394959 1 base_controller.go:181] Shutting down APIServerStaticResources-StaticResources ... 2026-03-13T12:38:37.397804413Z E0313 12:38:37.395093 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the operator is shutting down, skipping updating conditions, err = failed to reconcile enabled APIs: [Get \"https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices/v1.oauth.openshift.io\": context canceled, client rate limiter Wait returned an error: context canceled]" 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395097 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="a0ba0374d031c49a106672c73745e53c746589d052470dcba0e42410a3ad98cd") 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395146 1 base_controller.go:181] Shutting down oauth-server ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395169 1 base_controller.go:181] Shutting down openshift-authentication-IngressState ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395178 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395209 1 base_controller.go:123] Shutting down worker of oauth-server controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395216 1 base_controller.go:113] All oauth-server workers have been terminated 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395224 1 base_controller.go:123] Shutting down worker of openshift-authentication-IngressState controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395229 1 base_controller.go:113] All openshift-authentication-IngressState workers have been terminated 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395240 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorCertApprover_OpenShiftAuthenticator controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395246 1 base_controller.go:113] All WebhookAuthenticatorCertApprover_OpenShiftAuthenticator workers have been terminated 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395254 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395262 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395275 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395287 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395292 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395429 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395445 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395451 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395457 1 base_controller.go:181] Shutting down OAuthServerServiceEndpointAccessibleController ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395466 1 base_controller.go:181] Shutting down openshift-authentication-ServiceCA ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395469 1 base_controller.go:123] Shutting down worker of OAuthServerServiceEndpointAccessibleController controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395475 1 base_controller.go:123] Shutting down worker of openshift-authentication-ServiceCA controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395475 1 base_controller.go:113] All OAuthServerServiceEndpointAccessibleController workers have been terminated 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395481 1 base_controller.go:113] All openshift-authentication-ServiceCA workers have been terminated 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395577 1 base_controller.go:181] Shutting down openshift-authentication-RemoveStaleConditions ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395585 1 base_controller.go:181] Shutting down authentication-ManagementState ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395594 1 base_controller.go:181] Shutting down OpenShiftAuthenticatorCertRequester ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395607 1 base_controller.go:123] Shutting down worker of openshift-authentication-RemoveStaleConditions controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395611 1 base_controller.go:113] All openshift-authentication-RemoveStaleConditions workers have been terminated 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395617 1 base_controller.go:123] Shutting down worker of authentication-ManagementState controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395622 1 base_controller.go:113] All authentication-ManagementState workers have been terminated 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395628 1 base_controller.go:123] Shutting down worker of OpenShiftAuthenticatorCertRequester controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395632 1 base_controller.go:113] All OpenShiftAuthenticatorCertRequester workers have been terminated 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395647 1 base_controller.go:181] Shutting down openshift-authentication-UnsupportedConfigOverrides ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395655 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395663 1 base_controller.go:123] Shutting down worker of openshift-authentication-UnsupportedConfigOverrides controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395668 1 base_controller.go:113] All openshift-authentication-UnsupportedConfigOverrides workers have been terminated 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395673 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.395676 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-13T12:38:37.397804413Z I0313 12:38:37.396113 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.396121 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-03-13T12:38:37.397804413Z E0313 12:38:37.396214 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": client rate limiter Wait returned an error: context canceled" 2026-03-13T12:38:37.397804413Z I0313 12:38:37.396547 1 base_controller.go:123] Shutting down worker of TrustDistributionController controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.396556 1 base_controller.go:113] All TrustDistributionController workers have been terminated 2026-03-13T12:38:37.397804413Z I0313 12:38:37.396570 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-oauth-apiserver controller ... 2026-03-13T12:38:37.397804413Z I0313 12:38:37.396578 1 base_controller.go:113] All NamespaceFinalizerController_openshift-oauth-apiserver workers have been terminated 2026-03-13T12:38:37.397804413Z E0313 12:38:37.396848 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-13T12:38:37.397804413Z E0313 12:38:37.396949 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-03-13T12:38:37.397804413Z E0313 12:38:37.397041 1 leaderelection.go:436] error retrieving resource lock openshift-authentication-operator/cluster-authentication-operator-lock: client rate limiter Wait returned an error: context canceled 2026-03-13T12:38:37.397804413Z I0313 12:38:37.397058 1 leaderelection.go:297] failed to renew lease openshift-authentication-operator/cluster-authentication-operator-lock: timed out waiting for the condition 2026-03-13T12:38:37.397804413Z I0313 12:38:37.397370 1 base_controller.go:123] Shutting down worker of OAuthAPIServerController-WorkloadWorkloadController controller ... 2026-03-13T12:38:37.397931818Z I0313 12:38:37.397402 1 base_controller.go:113] All OAuthAPIServerController-WorkloadWorkloadController workers have been terminated 2026-03-13T12:38:37.397955509Z E0313 12:38:37.397935 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver\": context canceled, \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T12:38:37.398023511Z I0313 12:38:37.397978 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-13T12:38:37.398023511Z I0313 12:38:37.397994 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-13T12:38:37.398429996Z I0313 12:38:37.398067 1 base_controller.go:123] Shutting down worker of StatusSyncer_authentication controller ... 2026-03-13T12:38:37.398511849Z I0313 12:38:37.398074 1 base_controller.go:181] Shutting down StatusSyncer_authentication ... 2026-03-13T12:38:37.398585782Z I0313 12:38:37.398556 1 base_controller.go:159] All StatusSyncer_authentication post start hooks have been terminated 2026-03-13T12:38:37.398669815Z I0313 12:38:37.398645 1 base_controller.go:113] All StatusSyncer_authentication workers have been terminated 2026-03-13T12:38:37.399954431Z I0313 12:38:37.399906 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-03-13T12:38:37.399954431Z I0313 12:38:37.399922 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-03-13T12:38:37.400503692Z E0313 12:38:37.400422 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": context canceled, \"oauth-openshift/oauth-service.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/trust_distribution_role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T12:38:37.401649954Z I0313 12:38:37.401575 1 base_controller.go:123] Shutting down worker of OpenshiftAuthenticationStaticResources-StaticResources controller ... 2026-03-13T12:38:37.401649954Z I0313 12:38:37.401598 1 base_controller.go:113] All OpenshiftAuthenticationStaticResources-StaticResources workers have been terminated 2026-03-13T12:38:42.392932515Z I0313 12:38:42.392855 1 observer_polling.go:162] Shutting down file observer 2026-03-13T12:39:03.583832268Z I0313 12:39:03.580365 1 cmd.go:141] Received SIGTERM or SIGINT signal, shutting down controller. 2026-03-13T12:39:11.401093297Z E0313 12:39:11.400972 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T12:39:11.401126597Z W0313 12:39:11.401121 1 leaderelection.go:84] leader election lost config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-tc4ht.json0000640000000000000000000001610315155003025030250 0ustar0000000000000000{"metadata":{"name":"authentication-operator-7c6989d6c4-tc4ht","generateName":"authentication-operator-7c6989d6c4-","namespace":"openshift-authentication-operator","uid":"d11f8baa-6e8e-4ac0-9b23-1c44efd0ab2a","resourceVersion":"9144","creationTimestamp":"2026-03-13T12:35:31Z","labels":{"app":"authentication-operator","pod-template-hash":"7c6989d6c4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.22/23\"],\"mac_address\":\"0a:58:0a:80:00:16\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.22/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.22\"\n ],\n \"mac\": \"0a:58:0a:80:00:16\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-7c6989d6c4","uid":"0366ad32-2975-43c1-a74a-47e4eeaa632d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-m4tnq","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3d3571ade02a7c61123d62c53fda6a57031a52c058c0571759dc09f96b23978f"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.34_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-m4tnq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c9"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:26Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:31Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:31Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.22","podIPs":[{"ip":"10.128.0.22"}],"startTime":"2026-03-13T12:37:21Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-03-13T12:39:11Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T12:37:31Z","finishedAt":"2026-03-13T12:39:11Z","containerID":"cri-o://13a298fff8d915caaf89a785573e9b3488b88852d2c326a75e61c523b3cd60a0"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","containerID":"cri-o://dc8ec1aed61fa783f1383f45771cb4136de885100e0460aa1df476073926f5af","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-m4tnq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000003611215155003025020633 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:31:14Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:31:24Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-854648ff6d to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:31:26Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-d64cfc9db to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:31:27Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-854648ff6d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:31:27Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-7d9c49f57b to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:31:28Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-7d9c49f57b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:31:28Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-d64cfc9db-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:35:27Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:35:27Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-7d9c49f57b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:35:28Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-854648ff6d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:35:28Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-d64cfc9db-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:35:29Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:35:29Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-7d9c49f57b-tlnkd","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:35:30Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-d64cfc9db-rfqb9","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:35:30Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-854648ff6d-669qk","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:35:30Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:35:30Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:37:21Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-669qk to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:37:21Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-tlnkd to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:37:21Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rfqb9 to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:37:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:37:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:37:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:37:58Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:37:58Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:37:58Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:31Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.20/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:31Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:31Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:31Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:31Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:31Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.17/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:31Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:31Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:31Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.23/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:38Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:38Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:38Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 7.291s (7.291s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:38Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 7.389s (7.389s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:38Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:38Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:38Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:38Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:38:38Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 7.029s (7.029s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:00Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.20:8443/healthz\": dial tcp 10.128.0.20:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:00Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:00Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:00Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.20:8443/healthz\": dial tcp 10.128.0.20:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:10Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:10Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.20:8443/healthz\": dial tcp 10.128.0.20:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:10Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.20:8443/healthz\": dial tcp 10.128.0.20:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:10Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:22Z","reason":"LeaderElection","message":"package-server-manager-854648ff6d-669qk_941569f9-0330-4829-bd92-132c950ecda0 became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:34Z","reason":"NoOperatorGroup","message":"csv in namespace with no operatorgroups","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:43Z","reason":"RequirementsUnknown","message":"InstallModes now support target namespaces","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:43Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:44Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:44Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:45Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-5c5f6764b5-96ktp","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:45Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:45Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-5c5f6764b5 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:47Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.63/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:40:54Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:41:22Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T12:41:22Z","reason":"Created","message":"Created container: packageserver","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001312715155003025015434 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-7cbf874688 to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:37:58Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-7cbf874688-d4wjw","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:37:58Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-7cbf874688-d4wjw to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:02Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-7cbf874688-d4wjw","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:02Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-844bc54c88-vznst","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:02Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:02Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-844bc54c88 to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:02Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-7cbf874688 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:02Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:03Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:05Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-844bc54c88-vznst to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:13Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.42/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:13Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:18Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\" in 5.363s (5.363s including waiting). Image size: 589379637 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:18Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:18Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:19Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:19Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:20Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:20Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:20Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:20Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:21Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[-]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa failed: reason withheld\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T12:38:21Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000011611415155003025017265 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:31:12Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-799b6db4d7 to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:31:23Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-799b6db4d7-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:35:28Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-799b6db4d7-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:35:30Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:35:30Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-799b6db4d7-xchrj","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:21Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-xchrj to master-0","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.13/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:21Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:29Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:29Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:43Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\" in 723ms (723ms including waiting). Image size: 512273539 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:44Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:44Z","reason":"LeaderElection","message":"openshift-apiserver-operator-799b6db4d7-xchrj_f2e2c704-61ba-49f3-afb7-0efd81bd4042 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:44Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:44Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"audit\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n  }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:47Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:49Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:51Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:51Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \\nResourceSyncControllerDegraded: secrets \\\"etcd-client\\\" already exists\" to \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \\nResourceSyncControllerDegraded: secrets \\\"etcd-client\\\" already exists\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"SecretCreateFailed","message":"Failed to create Secret/etcd-client -n openshift-apiserver: secrets \"etcd-client\" already exists","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:37:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"All is well\",Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:02Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:26Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.34\"}] to [{\"operator\" \"4.18.34\"} {\"openshift-apiserver\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:26Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:26Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:26Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:26Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:26Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:26Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:27Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:27Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:27Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:27Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:27Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:28Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:28Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:28Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:28Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:28Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:28Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:28Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:38:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:40:27Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:40:27Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:40:27Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:40:27Z","reason":"LeaderElection","message":"openshift-apiserver-operator-799b6db4d7-xchrj_ac5af1d7-0d23-4f87-9d9c-42224c4a7325 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:40:27Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:40:29Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T12:40:30Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000007640315155003025020175 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:31:11Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-5c74bfc494 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:31:21Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-5c74bfc494-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:35:27Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-5c74bfc494-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:35:29Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:35:29Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-5c74bfc494-m8mqj","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:20Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-m8mqj to master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.19/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:21Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:26Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:31Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" in 4.603s (4.603s including waiting). Image size: 506394574 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"All is well\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-5c74bfc494-m8mqj_97e062fb-fe2d-47c9-a765-33ddfbfd684c became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:36Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:36Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:39Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:41Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:41Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:41Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:43Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:43Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:51Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:52Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:54Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:37:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:00Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:01Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:02Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:03Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:03Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:08Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:09Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:11Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:11Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:17Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:23Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:23Z","reason":"StartingNewRevision","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:29Z","reason":"SecretCreated","message":"Created Secret/serving-cert-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:30Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:38:31Z","reason":"RevisionTriggered","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:40:13Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:40:14Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T12:40:14Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000000516015155003025016334 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T12:37:58Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.36/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T12:37:58Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T12:37:59Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T12:37:59Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T12:38:05Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T12:38:13Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.43/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T12:38:13Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T12:38:13Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T12:38:13Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T12:38:16Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T12:38:19Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.46/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T12:38:19Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T12:38:19Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T12:38:19Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000012175515155003025022013 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:31:11Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-86d7cdfdfb to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:31:21Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-86d7cdfdfb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:35:27Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-86d7cdfdfb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:35:29Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:35:29Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-86d7cdfdfb-br96g","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:20Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-controller-manager-operator/kube-controller-manager-operator-86d7cdfdfb-br96g to master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.9/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:21Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:27Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:27Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:38Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:39Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:39Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" in 459ms (459ms including waiting). Image size: 508888174 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:39Z","reason":"LeaderElection","message":"kube-controller-manager-operator-86d7cdfdfb-br96g_15843b4e-b066-4afd-8ed3-947b07427e11 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:40Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:40Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"All is well\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:40Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:40Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:43Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:43Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:43Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:43Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:44Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-vzkkx\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:47Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-vzkkx\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:47Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:52Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:56Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:58Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:58Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:58Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:37:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:01Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:08Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:11Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:13Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:14Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:14Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:15Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:16Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:16Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:16Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:18Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:18Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:20Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/csr-controller-ca -n openshift-config-managed:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:21Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:22Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:30Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:30Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:31Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:31Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:38:32Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:40:13Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:40:14Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T12:40:14Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000000147615155003025020157 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T12:38:22Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.48/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T12:38:22Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T12:38:22Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T12:38:22Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215155003025016354 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-13T12:38:20Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.47/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-13T12:38:21Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-13T12:38:22Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-13T12:38:22Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000021101315155003025020203 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:31:26Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-68bd585b to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:31:28Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-68bd585b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:35:27Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-68bd585b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:35:29Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:35:29Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-68bd585b-qxmnf","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:21Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:21Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:21Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-qxmnf to master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:21Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:22Z","reason":"LeaderElection","message":"kube-apiserver-operator-68bd585b-qxmnf_617e9e0f-0af3-4573-aa6f-87f56fccabf6 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:22Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:23Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:23Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:23Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:24Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable changed from Unknown to True (\"All is well\"),EvaluationConditionsDetected changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:24Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:25Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:25Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:25Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:25Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable message changed from \"All is well\" to \"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:26Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:27Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:27Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:27Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:27Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:27Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:27Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:28Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:28Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:28Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:28Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:29Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:29Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:29Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:29Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:29Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:30Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:30Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:30Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:30Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:31Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:31Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:31Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:32Z","reason":"RotationError","message":"configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:32Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:32Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:32Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:32Z","reason":"RotationError","message":"configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:32Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:32Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:33Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:33Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:33Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:35Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:35Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:35Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:35Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:36Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:38Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:38Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:38Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:39Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:39Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:39Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:39Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:40Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:41Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:43Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:44Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:44Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:50Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:51Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:52Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:52Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:58Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:37:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:03Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:09Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:12Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:12Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:12Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:14Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:16Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:19Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:21Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/kubelet-serving-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:21Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:23Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kubelet-serving-ca -n openshift-config-managed:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:27Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-apiserver:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:29Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-apiserver-client-ca -n openshift-config-managed:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:38:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:40:13Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:40:14Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T12:40:14Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001260615155003025014354 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:38:02Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:38:02Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.39/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:38:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:38:02Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:38:33Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:38:46Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:38:47Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:38:47Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:01Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:01Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:01Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:15Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:15Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:15Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:29Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:29Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:29Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:29Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:29Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:29Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:29Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:29Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:29Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:29Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:30Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:30Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:30Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:30Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T12:39:30Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000004117015155003025016203 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:31:13Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-5884b9cd56 to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:31:23Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-5884b9cd56-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:35:27Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-5884b9cd56-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:35:29Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:35:29Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-5884b9cd56-hjzms","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:20Z","reason":"Scheduled","message":"Successfully assigned openshift-etcd-operator/etcd-operator-5884b9cd56-hjzms to master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.5/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:21Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:29Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:29Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:43Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:44Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" in 490ms (490ms including waiting). Image size: 518384455 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: getting cache client could not retrieve endpoints: node lister not synced\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"LeaderElection","message":"etcd-operator-5884b9cd56-hjzms_da13c472-658d-4d49-a5d8-2606ea23adfe became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:47Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:47Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:47Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:50Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:50Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:50Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:52Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:52Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:52Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:54Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:56Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:58Z","reason":"ScriptControllerErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:58Z","reason":"EtcdEndpointsErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:37:58Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:39:16Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.5:8443/healthz\": dial tcp 10.128.0.5:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:39:16Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.5:8443/healthz\": dial tcp 10.128.0.5:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:40:13Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:40:14Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T12:40:14Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"}]}events/openshift-machine-api.json0000640000000000000000000002561715155003025015616 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:45Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-baremetal-operator-5cdb4c5598 to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:45Z","reason":"SuccessfulCreate","message":"Created pod: cluster-autoscaler-operator-69576476f7-sqndx","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:45Z","reason":"SuccessfulCreate","message":"Created pod: control-plane-machine-set-operator-6686554ddc-btz8w","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:45Z","reason":"ScalingReplicaSet","message":"Scaled up replica set control-plane-machine-set-operator-6686554ddc to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:45Z","reason":"SuccessfulCreate","message":"Created pod: cluster-baremetal-operator-5cdb4c5598-l6jp5","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:45Z","reason":"ScalingReplicaSet","message":"Scaled up replica set machine-api-operator-84bf6db4f9 to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:45Z","reason":"SuccessfulCreate","message":"Created pod: machine-api-operator-84bf6db4f9-mjxcz","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:45Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-autoscaler-operator-69576476f7 to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:46Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:00b591b3820682dc99f16f07a3a0a4ec06dfedba63cd0f79b998ac4509fabea3\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.61/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:46Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.60/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:46Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.62/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:46Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:46Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:47Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.59/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:47Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2508a5f66e509e813cb09825b5456be91b4cdd4d02f470f22a33de42c753f2b7\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:47Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:47Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:40:47Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:22Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d\" in 35.393s (35.393s including waiting). Image size: 470822665 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:22Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2508a5f66e509e813cb09825b5456be91b4cdd4d02f470f22a33de42c753f2b7\" in 35.029s (35.029s including waiting). Image size: 862197440 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:22Z","reason":"Started","message":"Started container cluster-autoscaler-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:22Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1\" in 35.087s (35.087s including waiting). Image size: 470680779 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:22Z","reason":"Created","message":"Created container: control-plane-machine-set-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:22Z","reason":"Started","message":"Started container control-plane-machine-set-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:22Z","reason":"Created","message":"Created container: cluster-baremetal-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:22Z","reason":"Created","message":"Created container: cluster-autoscaler-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:22Z","reason":"LeaderElection","message":"cluster-autoscaler-operator-69576476f7-sqndx_6d5bdbd9-d328-4c2e-a7b3-3202e2a53102 became leader","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:22Z","reason":"Started","message":"Started container machine-api-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:22Z","reason":"Started","message":"Started container cluster-baremetal-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:22Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:22Z","reason":"Created","message":"Created container: machine-api-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:22Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:00b591b3820682dc99f16f07a3a0a4ec06dfedba63cd0f79b998ac4509fabea3\" in 35.389s (35.389s including waiting). Image size: 456374430 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:23Z","reason":"Started","message":"Started container baremetal-kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:23Z","reason":"Created","message":"Created container: baremetal-kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:25Z","reason":"LeaderElection","message":"control-plane-machine-set-operator-6686554ddc-btz8w_0a779534-040c-4d66-acfc-e4fb0aa01b7b became leader","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:26Z","reason":"LeaderElection","message":"cluster-baremetal-operator-5cdb4c5598-l6jp5_568c036c-d732-4892-8716-9862d1eb3849 became leader","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T12:41:26Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000001046315155003025016552 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:37:59Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-6b7d89b46f-h7w7h","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:37:59Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-6b7d89b46f to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:37:59Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-6b7d89b46f-h7w7h to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:00Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.38/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:00Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:05Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-787dbf5bb9 to 1 from 0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:05Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-6b7d89b46f-h7w7h","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:05Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:05Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-787dbf5bb9-5645n","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:05Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-6b7d89b46f to 0 from 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:12Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\" in 12.479s (12.479s including waiting). Image size: 505344964 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:13Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:13Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:15Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:15Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:15Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-787dbf5bb9-5645n to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:16Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:16Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:18Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T12:38:18Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000124015155003025015077 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-03-13T12:38:15Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-13T12:38:15Z","reason":"SuccessfulCreate","message":"Created pod: router-default-79f8cd6fdd-wtf6j","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-13T12:38:15Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-79f8cd6fdd to 1","type":"Normal"}]}events/openshift-authentication-operator.json0000640000000000000000000024145615155003025020314 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:31:14Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-7c6989d6c4 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:31:24Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-7c6989d6c4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:35:28Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-7c6989d6c4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:35:31Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:35:31Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-7c6989d6c4-tc4ht","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.22/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:21Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-7c6989d6c4-tc4ht to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:21Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:27Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:31Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\" in 3.638s (3.638s including waiting). Image size: 513220825 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:33Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+ \\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+ \\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:33Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:33Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:33Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:33Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:33Z","reason":"LeaderElection","message":"authentication-operator-7c6989d6c4-tc4ht_2446662a-0cbc-48f9-b1c0-ee8163abcb81 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\",Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:38Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:38Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-fsshr\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:38Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:38Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:38Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:38Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:38Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:38Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:38Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-fsshr\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:40Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:41Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:41Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:43Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:45Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\\"oauthConfig\\\": map[string]any{\\n+ \\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+ \\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+ \\t\\t\\t\\\"templates\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+ \\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n+ \\t\\t\\\"serverArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+ \\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+ \\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+ \\t\\t},\\n+ \\t\\t\\\"servingInfo\\\": map[string]any{\\n+ \\t\\t\\t\\\"cipherSuites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:46Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:51Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:54Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:54Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:56Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:58Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:59Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:37:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Failed to get system serving cert secret \\\"v4-0-config-system-serving-cert\\\": secret \\\"v4-0-config-system-serving-cert\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Failed to get system serving cert secret \\\"v4-0-config-system-serving-cert\\\": secret \\\"v4-0-config-system-serving-cert\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:09Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:19Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any{\\n \\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n \\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n \\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n \\t\\\"servingInfo\\\": map[string]any{\\n \\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n \\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t\\\"namedCertificates\\\": []any{\\n+ \\t\\t\\tmap[string]any{\\n+ \\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n \\t},\\n \\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n }\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:19Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:19Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:20Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:20Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:20Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:20Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:23Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.34\"}] to [{\"operator\" \"4.18.34\"} {\"oauth-apiserver\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:38:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.69.243:443/healthz\\\": dial tcp 172.30.69.243:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:39:03Z","reason":"Killing","message":"Container authentication-operator failed liveness probe, will be restarted","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:39:03Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.22:8443/healthz\": dial tcp 10.128.0.22:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:39:03Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.22:8443/healthz\": dial tcp 10.128.0.22:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:39:11Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:39:11Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T12:39:11Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\" already present on machine","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015155003025016264 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-13T12:38:16Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-13T12:38:16Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003511615155003020014575 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":340,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-canary":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-os-puller","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015155003016014067 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515155002767023225 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115155002767025435 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715155002767025135 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715155002767025144 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315155002767022255 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515155002767026711 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115155002767023414 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115155002767023210 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115155002767025500 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- aggregated/unused_machine_configs_count.json0000640000000000000000000000004115155002767020137 0ustar0000000000000000{"unused_machineconfigs_count":9}aggregated/ingress_controllers_certs.json0000640000000000000000000000045715155002767017543 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-03-13T12:38:13Z","not_after":"2028-03-12T12:38:14Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-03-13T12:38:15Z","not_after":"2028-03-12T12:38:16Z","controllers":[]}]config/node/logs/master-0.log0000640000000000000000000006762315155002766014556 0ustar0000000000000000Mar 13 12:39:40.774619 master-0 kubenswrapper[7518]: I0313 12:39:40.773961 7518 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-tlnkd" podUID="10944f9c-8ce9-44e6-9c36-a0ea19d8cae3" containerName="catalog-operator" probeResult="failure" output="Get \"https://10.128.0.20:8443/healthz\": dial tcp 10.128.0.20:8443: connect: connection refused" Mar 13 12:39:40.778472 master-0 kubenswrapper[7518]: I0313 12:39:40.778400 7518 patch_prober.go:28] interesting pod/olm-operator-d64cfc9db-rfqb9 container/olm-operator namespace/openshift-operator-lifecycle-manager: Liveness probe status=failure output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" start-of-body= Mar 13 12:39:40.778472 master-0 kubenswrapper[7518]: I0313 12:39:40.778455 7518 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rfqb9" podUID="d5a19b80-d488-46d3-a4a8-0b80361077e1" containerName="olm-operator" probeResult="failure" output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" Mar 13 12:39:40.779048 master-0 kubenswrapper[7518]: I0313 12:39:40.778526 7518 patch_prober.go:28] interesting pod/olm-operator-d64cfc9db-rfqb9 container/olm-operator namespace/openshift-operator-lifecycle-manager: Readiness probe status=failure output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" start-of-body= Mar 13 12:39:40.779048 master-0 kubenswrapper[7518]: I0313 12:39:40.778572 7518 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rfqb9" podUID="d5a19b80-d488-46d3-a4a8-0b80361077e1" containerName="olm-operator" probeResult="failure" output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" Mar 13 12:39:41.670847 master-0 kubenswrapper[7518]: E0313 12:39:41.670705 7518 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{network-metrics-daemon-r9lmb.189c66eb94af50ee openshift-multus 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-multus,Name:network-metrics-daemon-r9lmb,UID:29b6aa89-0416-4595-9deb-10b290521d86,APIVersion:v1,ResourceVersion:3460,FieldPath:spec.containers{network-metrics-daemon},},Reason:Pulled,Message:Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626\" in 3.877s (3.877s including waiting). Image size: 448828105 bytes.,Source:EventSource{Component:kubelet,Host:master-0,},FirstTimestamp:2026-03-13 12:38:35.274997998 +0000 UTC m=+69.908067195,LastTimestamp:2026-03-13 12:38:35.274997998 +0000 UTC m=+69.908067195,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:master-0,}" Mar 13 12:39:48.611016 master-0 kubenswrapper[7518]: E0313 12:39:48.610814 7518 kubelet_node_status.go:585] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2026-03-13T12:39:38Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-03-13T12:39:38Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-03-13T12:39:38Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-03-13T12:39:38Z\\\",\\\"type\\\":\\\"Ready\\\"}],\\\"images\\\":[{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\\\"],\\\"sizeBytes\\\":1637445817},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192\\\"],\\\"sizeBytes\\\":1238047254},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c\\\"],\\\"sizeBytes\\\":992610645},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4\\\"],\\\"sizeBytes\\\":943837171},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a\\\"],\\\"sizeBytes\\\":876146500},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\\\"],\\\"sizeBytes\\\":862633255},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bfcd8017eede3fb66fa3f5b47c27508b787d38455689154461f0e6a5dc303ff\\\"],\\\"sizeBytes\\\":772939850},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9c946fdc5a4cd16ff998c17844780e7efc38f7f38b97a8a40d75cd77b318ddef\\\"],\\\"sizeBytes\\\":687947017},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245\\\"],\\\"sizeBytes\\\":683169303},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70\\\"],\\\"sizeBytes\\\":677929075},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3\\\"],\\\"sizeBytes\\\":621647686},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\\\"],\\\"sizeBytes\\\":589379637},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460\\\"],\\\"sizeBytes\\\":582153879},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5\\\"],\\\"sizeBytes\\\":558210153},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:28f33d62fd0b94c5ea0ebcd7a4216848c8dd671a38d901ce98f4c399b700e1c7\\\"],\\\"sizeBytes\\\":548751793},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\\\"],\\\"sizeBytes\\\":529324693},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916\\\"],\\\"sizeBytes\\\":528946249},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\\\"],\\\"sizeBytes\\\":518384455},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\\\"],\\\"sizeBytes\\\":517997625},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\\\"],\\\"sizeBytes\\\":514980169},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\\\"],\\\"sizeBytes\\\":513220825},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\\\"],\\\"sizeBytes\\\":512273539},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0\\\"],\\\"sizeBytes\\\":511226810},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6\\\"],\\\"sizeBytes\\\":511164376},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\\\"],\\\"sizeBytes\\\":508888174},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba\\\"],\\\"sizeBytes\\\":508544235},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b\\\"],\\\"sizeBytes\\\":507967997},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3\\\"],\\\"sizeBytes\\\":506479655},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\\\"],\\\"sizeBytes\\\":506394574},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\\\"],\\\"sizeBytes\\\":505344964},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609\\\"],\\\"sizeBytes\\\":505242594},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9\\\"],\\\"sizeBytes\\\":504623546},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5\\\"],\\\"sizeBytes\\\":495994161},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc\\\"],\\\"sizeBytes\\\":495064829},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06\\\"],\\\"sizeBytes\\\":487090672},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e\\\"],\\\"sizeBytes\\\":484450382},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955\\\"],\\\"sizeBytes\\\":484175664},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b9b8bc43bac294be3c7669cde049e388ad9d8751242051ba40f83e1c401eceda\\\"],\\\"sizeBytes\\\":468263999},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\\\"],\\\"sizeBytes\\\":465086330},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1\\\"],\\\"sizeBytes\\\":463700811},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b714a7ada1e295b599b432f32e1fd5b74c8cdbe6fe51e95306322b25cb873914\\\"],\\\"sizeBytes\\\":458126424},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9\\\"],\\\"sizeBytes\\\":456575686},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626\\\"],\\\"sizeBytes\\\":448828105},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783\\\"],\\\"sizeBytes\\\":448041621},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053\\\"],\\\"sizeBytes\\\":443271011},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43\\\"],\\\"sizeBytes\\\":438654375},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7\\\"],\\\"sizeBytes\\\":411585608},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7\\\"],\\\"sizeBytes\\\":407347126},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1d605384f31a8085f78a96145c2c3dc51afe22721144196140a2699b7c07ebe3\\\"],\\\"sizeBytes\\\":396521759}]}}\" for node \"master-0\": Patch \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0/status?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 13 12:39:48.969663 master-0 kubenswrapper[7518]: E0313 12:39:48.969481 7518 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="400ms" Mar 13 12:39:50.774549 master-0 kubenswrapper[7518]: I0313 12:39:50.774434 7518 patch_prober.go:28] interesting pod/catalog-operator-7d9c49f57b-tlnkd container/catalog-operator namespace/openshift-operator-lifecycle-manager: Liveness probe status=failure output="Get \"https://10.128.0.20:8443/healthz\": dial tcp 10.128.0.20:8443: connect: connection refused" start-of-body= Mar 13 12:39:50.774843 master-0 kubenswrapper[7518]: I0313 12:39:50.774439 7518 patch_prober.go:28] interesting pod/catalog-operator-7d9c49f57b-tlnkd container/catalog-operator namespace/openshift-operator-lifecycle-manager: Readiness probe status=failure output="Get \"https://10.128.0.20:8443/healthz\": dial tcp 10.128.0.20:8443: connect: connection refused" start-of-body= Mar 13 12:39:50.774843 master-0 kubenswrapper[7518]: I0313 12:39:50.774591 7518 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-tlnkd" podUID="10944f9c-8ce9-44e6-9c36-a0ea19d8cae3" containerName="catalog-operator" probeResult="failure" output="Get \"https://10.128.0.20:8443/healthz\": dial tcp 10.128.0.20:8443: connect: connection refused" Mar 13 12:39:50.774843 master-0 kubenswrapper[7518]: I0313 12:39:50.774668 7518 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-tlnkd" podUID="10944f9c-8ce9-44e6-9c36-a0ea19d8cae3" containerName="catalog-operator" probeResult="failure" output="Get \"https://10.128.0.20:8443/healthz\": dial tcp 10.128.0.20:8443: connect: connection refused" Mar 13 12:39:50.778299 master-0 kubenswrapper[7518]: I0313 12:39:50.778246 7518 patch_prober.go:28] interesting pod/olm-operator-d64cfc9db-rfqb9 container/olm-operator namespace/openshift-operator-lifecycle-manager: Readiness probe status=failure output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" start-of-body= Mar 13 12:39:50.778585 master-0 kubenswrapper[7518]: I0313 12:39:50.778526 7518 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rfqb9" podUID="d5a19b80-d488-46d3-a4a8-0b80361077e1" containerName="olm-operator" probeResult="failure" output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" Mar 13 12:39:50.778919 master-0 kubenswrapper[7518]: I0313 12:39:50.778879 7518 patch_prober.go:28] interesting pod/olm-operator-d64cfc9db-rfqb9 container/olm-operator namespace/openshift-operator-lifecycle-manager: Liveness probe status=failure output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" start-of-body= Mar 13 12:39:50.779212 master-0 kubenswrapper[7518]: I0313 12:39:50.779125 7518 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rfqb9" podUID="d5a19b80-d488-46d3-a4a8-0b80361077e1" containerName="olm-operator" probeResult="failure" output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" Mar 13 12:39:58.613399 master-0 kubenswrapper[7518]: E0313 12:39:58.613281 7518 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 13 12:39:59.371722 master-0 kubenswrapper[7518]: E0313 12:39:59.371614 7518 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="800ms" Mar 13 12:40:00.774560 master-0 kubenswrapper[7518]: I0313 12:40:00.774491 7518 patch_prober.go:28] interesting pod/catalog-operator-7d9c49f57b-tlnkd container/catalog-operator namespace/openshift-operator-lifecycle-manager: Readiness probe status=failure output="Get \"https://10.128.0.20:8443/healthz\": dial tcp 10.128.0.20:8443: connect: connection refused" start-of-body= Mar 13 12:40:00.775105 master-0 kubenswrapper[7518]: I0313 12:40:00.774581 7518 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-tlnkd" podUID="10944f9c-8ce9-44e6-9c36-a0ea19d8cae3" containerName="catalog-operator" probeResult="failure" output="Get \"https://10.128.0.20:8443/healthz\": dial tcp 10.128.0.20:8443: connect: connection refused" Mar 13 12:40:00.775105 master-0 kubenswrapper[7518]: I0313 12:40:00.774483 7518 patch_prober.go:28] interesting pod/catalog-operator-7d9c49f57b-tlnkd container/catalog-operator namespace/openshift-operator-lifecycle-manager: Liveness probe status=failure output="Get \"https://10.128.0.20:8443/healthz\": dial tcp 10.128.0.20:8443: connect: connection refused" start-of-body= Mar 13 12:40:00.775105 master-0 kubenswrapper[7518]: I0313 12:40:00.774659 7518 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-tlnkd" podUID="10944f9c-8ce9-44e6-9c36-a0ea19d8cae3" containerName="catalog-operator" probeResult="failure" output="Get \"https://10.128.0.20:8443/healthz\": dial tcp 10.128.0.20:8443: connect: connection refused" Mar 13 12:40:00.778272 master-0 kubenswrapper[7518]: I0313 12:40:00.778229 7518 patch_prober.go:28] interesting pod/olm-operator-d64cfc9db-rfqb9 container/olm-operator namespace/openshift-operator-lifecycle-manager: Readiness probe status=failure output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" start-of-body= Mar 13 12:40:00.778354 master-0 kubenswrapper[7518]: I0313 12:40:00.778287 7518 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rfqb9" podUID="d5a19b80-d488-46d3-a4a8-0b80361077e1" containerName="olm-operator" probeResult="failure" output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" Mar 13 12:40:00.778354 master-0 kubenswrapper[7518]: I0313 12:40:00.778298 7518 patch_prober.go:28] interesting pod/olm-operator-d64cfc9db-rfqb9 container/olm-operator namespace/openshift-operator-lifecycle-manager: Liveness probe status=failure output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" start-of-body= Mar 13 12:40:00.778436 master-0 kubenswrapper[7518]: I0313 12:40:00.778341 7518 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rfqb9" podUID="d5a19b80-d488-46d3-a4a8-0b80361077e1" containerName="olm-operator" probeResult="failure" output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" Mar 13 12:40:08.614752 master-0 kubenswrapper[7518]: E0313 12:40:08.614645 7518 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 13 12:40:10.172621 master-0 kubenswrapper[7518]: E0313 12:40:10.172533 7518 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="1.6s" Mar 13 12:40:10.774012 master-0 kubenswrapper[7518]: I0313 12:40:10.773883 7518 patch_prober.go:28] interesting pod/catalog-operator-7d9c49f57b-tlnkd container/catalog-operator namespace/openshift-operator-lifecycle-manager: Readiness probe status=failure output="Get \"https://10.128.0.20:8443/healthz\": dial tcp 10.128.0.20:8443: connect: connection refused" start-of-body= Mar 13 12:40:10.774387 master-0 kubenswrapper[7518]: I0313 12:40:10.774009 7518 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-tlnkd" podUID="10944f9c-8ce9-44e6-9c36-a0ea19d8cae3" containerName="catalog-operator" probeResult="failure" output="Get \"https://10.128.0.20:8443/healthz\": dial tcp 10.128.0.20:8443: connect: connection refused" Mar 13 12:40:10.779194 master-0 kubenswrapper[7518]: I0313 12:40:10.779051 7518 patch_prober.go:28] interesting pod/olm-operator-d64cfc9db-rfqb9 container/olm-operator namespace/openshift-operator-lifecycle-manager: Readiness probe status=failure output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" start-of-body= Mar 13 12:40:10.779419 master-0 kubenswrapper[7518]: I0313 12:40:10.779195 7518 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rfqb9" podUID="d5a19b80-d488-46d3-a4a8-0b80361077e1" containerName="olm-operator" probeResult="failure" output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" Mar 13 12:40:13.620796 master-0 kubenswrapper[7518]: E0313 12:40:13.620630 7518 mirror_client.go:138] "Failed deleting a mirror pod" err="Timeout: request did not complete within requested timeout - context deadline exceeded" pod="openshift-etcd/etcd-master-0-master-0" Mar 13 12:40:13.621825 master-0 kubenswrapper[7518]: E0313 12:40:13.621300 7518 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="34.01s" Mar 13 12:40:15.673557 master-0 kubenswrapper[7518]: E0313 12:40:15.673418 7518 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{cluster-monitoring-operator-674cbfbd9d-zwtdz.189c66eb95269ce8 openshift-monitoring 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-monitoring,Name:cluster-monitoring-operator-674cbfbd9d-zwtdz,UID:604456a0-4997-43bc-87ef-283a002111fe,APIVersion:v1,ResourceVersion:3566,FieldPath:spec.containers{cluster-monitoring-operator},},Reason:Pulled,Message:Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e\" in 3.67s (3.67s including waiting). Image size: 484450382 bytes.,Source:EventSource{Component:kubelet,Host:master-0,},FirstTimestamp:2026-03-13 12:38:35.282816232 +0000 UTC m=+69.915885409,LastTimestamp:2026-03-13 12:38:35.282816232 +0000 UTC m=+69.915885409,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:master-0,}" Mar 13 12:40:18.616012 master-0 kubenswrapper[7518]: E0313 12:40:18.615893 7518 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 13 12:40:18.721477 master-0 kubenswrapper[7518]: I0313 12:40:18.721388 7518 patch_prober.go:28] interesting pod/marketplace-operator-64bf9778cb-7qhr4 container/marketplace-operator namespace/openshift-marketplace: Readiness probe status=failure output="Get \"http://10.128.0.26:8080/healthz\": dial tcp 10.128.0.26:8080: connect: connection refused" start-of-body= Mar 13 12:40:18.721477 master-0 kubenswrapper[7518]: I0313 12:40:18.721415 7518 patch_prober.go:28] interesting pod/marketplace-operator-64bf9778cb-7qhr4 container/marketplace-operator namespace/openshift-marketplace: Liveness probe status=failure output="Get \"http://10.128.0.26:8080/healthz\": dial tcp 10.128.0.26:8080: connect: connection refused" start-of-body= Mar 13 12:40:18.721477 master-0 kubenswrapper[7518]: I0313 12:40:18.721463 7518 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-marketplace/marketplace-operator-64bf9778cb-7qhr4" podUID="d3d998ee-b26f-4e30-83bc-f94f8c68060a" containerName="marketplace-operator" probeResult="failure" output="Get \"http://10.128.0.26:8080/healthz\": dial tcp 10.128.0.26:8080: connect: connection refused" Mar 13 12:40:18.721917 master-0 kubenswrapper[7518]: I0313 12:40:18.721480 7518 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-marketplace/marketplace-operator-64bf9778cb-7qhr4" podUID="d3d998ee-b26f-4e30-83bc-f94f8c68060a" containerName="marketplace-operator" probeResult="failure" output="Get \"http://10.128.0.26:8080/healthz\": dial tcp 10.128.0.26:8080: connect: connection refused" Mar 13 12:40:27.163390 master-0 kubenswrapper[7518]: E0313 12:40:27.157193 7518 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="13.531s" Mar 13 12:40:27.892822 master-0 kubenswrapper[7518]: I0313 12:40:27.892695 7518 patch_prober.go:28] interesting pod/marketplace-operator-64bf9778cb-7qhr4 container/marketplace-operator namespace/openshift-marketplace: Readiness probe status=failure output="Get \"http://10.128.0.26:8080/healthz\": dial tcp 10.128.0.26:8080: connect: connection refused" start-of-body= Mar 13 12:40:27.892822 master-0 kubenswrapper[7518]: I0313 12:40:27.892732 7518 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-marketplace/marketplace-operator-64bf9778cb-7qhr4" podUID="d3d998ee-b26f-4e30-83bc-f94f8c68060a" containerName="marketplace-operator" probeResult="failure" output="Get \"http://10.128.0.26:8080/healthz\": dial tcp 10.128.0.26:8080: connect: connection refused" Mar 13 12:40:27.923867 master-0 kubenswrapper[7518]: E0313 12:40:27.923827 7518 kubelet.go:1929] "Failed creating a mirror pod for" err="pods \"etcd-master-0\" already exists" pod="openshift-etcd/etcd-master-0" Mar 13 12:40:28.616930 master-0 kubenswrapper[7518]: E0313 12:40:28.616871 7518 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 13 12:40:28.616930 master-0 kubenswrapper[7518]: E0313 12:40:28.616914 7518 kubelet_node_status.go:572] "Unable to update node status" err="update node status exceeds retry count" Mar 13 12:40:37.499369 master-0 kubenswrapper[7518]: E0313 12:40:37.499340 7518 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="88bf0bf8-c0ee-454e-8d8b-592a6e796cfc" containerName="installer" Mar 13 12:40:37.499441 master-0 kubenswrapper[7518]: E0313 12:40:37.499381 7518 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="3828446d-a3e3-412f-a0e7-7347b5de523a" containerName="installer" Mar 13 12:40:37.499441 master-0 kubenswrapper[7518]: E0313 12:40:37.499401 7518 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="00d2e134-62bb-4181-aa0a-22c9b9755b10" containerName="installer" Mar 13 12:40:37.499441 master-0 kubenswrapper[7518]: E0313 12:40:37.499420 7518 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="bfabb495-1707-4c3d-b00e-2f3b2976fb92" containerName="installer"config/clusteroperator/storage.json0000640000000000000000000000131215155002766016305 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"4218d54e-771c-48fc-88b3-ee500a8edf5f","resourceVersion":"734","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315155002766016665 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"5e6ab5c2-e716-4983-ad82-9c952b5d5e37","resourceVersion":"5169","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:37:43Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T12:37:47Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:37:45Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:37:45Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T12:37:43Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000307615155002766024672 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"ff0a6178-68d7-453c-9c97-3dc8aef51484","resourceVersion":"9992","generation":1,"creationTimestamp":"2026-03-13T12:30:57Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:40:33Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T12:40:33Z","reason":"ClusterServiceVersionNotSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Failed with reason: NoOperatorGroup, message: csv in namespace with no operatorgroups"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T12:40:43Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:40:33Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255615155002766023464 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"4c03cd2b-1e3f-4f59-998e-f86b7abad4db","resourceVersion":"10498","generation":1,"creationTimestamp":"2026-03-13T12:30:57Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:40:35Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T12:41:05Z","message":"Deployed 4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:40:35Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:40:35Z"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115155002766022047 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"ef86587b-690a-41ce-ba68-7da844953272","resourceVersion":"9343","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T12:40:33Z","message":"Deployed 4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:40:33Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:40:33Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:40:33Z"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315155002766020311 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"407bc90e-fe08-467d-a3e7-01f6b86f70bc","resourceVersion":"737","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000377215155002766022445 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"543ba167-e75b-4251-812d-db43682f53d1","resourceVersion":"7048","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:37:40Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T12:37:47Z","reason":"_DesiredStateNotYetAchieved","message":"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3."},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:38:20Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:37:47Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T12:37:40Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215155002766020643 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"222adb0a-54e0-48dc-aef1-c11a356b8224","resourceVersion":"8320","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:37:45Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T12:38:26Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T12:37:45Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:37:44Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T12:37:44Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"openshift-apiserver","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420415155002766015434 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"b2ea2aca-f0d1-451b-b11e-5840f2a5a420","resourceVersion":"6690","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:37:39Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T12:38:14Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:38:14Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:37:39Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T12:37:39Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115155002766017073 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"9a35f354-d5c2-47e7-8f93-d18104caeafc","resourceVersion":"6894","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:38:15Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.34\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T12:38:17Z","reason":"AsExpected","message":"Cluster version is \"4.18.34\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:38:13Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.34"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003635115155002766016345 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"bd9dac63-7f30-4701-a5b5-510ada1e63d4","resourceVersion":"6742","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-03-13T12:36:16Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:36:05Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:36:05Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T12:36:16Z","reason":"Deploying","message":"DaemonSet \"/openshift-multus/network-metrics-daemon\" is waiting for other operators to become ready"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:37:28Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715155002766017037 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"a2df1884-bbde-4dca-8abc-2cfb681f04d0","resourceVersion":"9355","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-03-13T12:40:33Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-03-13T12:40:33Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T12:40:33Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:40:33Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315155002766017134 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"5571bbd6-326f-4a0d-8035-b043f4ed7219","resourceVersion":"6608","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T12:38:13Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.34"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:38:13Z","reason":"OperatorAvailable","message":"Available release version: 4.18.34"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:38:13Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:38:13Z","reason":"OperatorAvailable","message":"Available release version: 4.18.34"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000230015155002766017506 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"af68dc72-f128-4794-aa1f-cc5ec86a72b7","resourceVersion":"833","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"","resource":"nodes","name":""}],"extension":null}}config/clusteroperator/machine-approver.json0000640000000000000000000000253315155002766020107 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"9a9b251c-3b0a-41b9-b00a-8864094d4b2a","resourceVersion":"10613","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:41:23Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.34"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:41:23Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T12:41:23Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:41:23Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000263415155002766017024 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"6e21a18e-7897-42d1-b9bd-c3436cf975f3","resourceVersion":"816","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","name":""},{"group":"machine.openshift.io","resource":"machinesets","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddresses","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddressclaims","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315155002766022544 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"d97ceb78-b13c-409e-b3b1-9e159cfbc5e3","resourceVersion":"5847","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:37:45Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T12:37:58Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:37:58Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:37:45Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T12:37:45Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615155002766017554 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"51ce1c8a-122c-4e39-bac9-047250f0c1c8","resourceVersion":"6776","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:37:34Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T12:37:57Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T12:37:34Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:37:34Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T12:37:34Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715155002766021375 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"565c2cfe-ca74-4c5f-b5e2-33c00225ca8d","resourceVersion":"6904","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:37:40Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T12:38:18Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T12:37:42Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:37:40Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T12:37:40Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715155002766017602 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"7b3c75e4-54e5-4dc2-b3e2-fe9ea1c5f548","resourceVersion":"6863","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:37:24Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T12:38:16Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T12:37:25Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:37:23Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-13T12:37:23Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000141415155002766016474 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"33085dd6-2d55-4a86-9eb5-fef49922eaac","resourceVersion":"826","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/ingress.json0000640000000000000000000000467615155002766016333 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"84c8ea2f-cb05-4d2b-8e41-396c41b7a576","resourceVersion":"9184","generation":1,"creationTimestamp":"2026-03-13T12:30:56Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:38:16Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T12:38:14Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:38:16Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:38:14Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-13T12:38:14Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-ingress-canary"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715155002766017577 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"3a4e6afd-2973-48b8-a301-7ecc93da046a","resourceVersion":"831","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015155002766015571 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"b2bec0e2-8189-4467-8684-ae4332f8ed44","resourceVersion":"6288","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:37:45Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T12:37:59Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T12:37:47Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:37:45Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T12:37:45Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365615155002766015442 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"c96bfff4-8247-4f20-8770-a8cd1fb4df04","resourceVersion":"10272","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:40:45Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T12:40:45Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:40:45Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:38:13Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715155002766021443 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"2bfa3738-1557-43cc-a7c5-04c22769a56c","resourceVersion":"9425","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:37:34Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T12:37:38Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:37:38Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:37:34Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T12:37:34Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"csi-snapshot-controller","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263615155002766021623 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"7219c074-0bd0-4f7b-93e0-8409d9123f78","resourceVersion":"10637","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:41:25Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T12:41:25Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:41:25Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:41:25Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215155002766016303 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"67341c54-dace-4d1a-995b-8c5ed1c27273","resourceVersion":"829","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615155002766017743 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"ec422391-2992-4b61-a912-1e09a1285a10","resourceVersion":"6056","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:38:00Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T12:38:00Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:38:00Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:38:00Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T12:38:00Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.34"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000260415155002766020467 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"75416cb4-c386-4484-93ae-f8c66488d2a8","resourceVersion":"10580","generation":1,"creationTimestamp":"2026-03-13T12:30:56Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:41:22Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T12:41:22Z"},{"type":"Degraded","status":"True","lastTransitionTime":"2026-03-13T12:41:22Z","reason":"MissingDependency","message":"machine-api not ready"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:41:22Z"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000000346515155002766020072 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"71620f68-9fcc-44e6-a596-aefda6be02fb","resourceVersion":"827","generation":1,"creationTimestamp":"2026-03-13T12:30:56Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"pod-identity-webhook"},{"group":"apps","resource":"deployments","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","name":""},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"","resource":"serviceaccounts","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"","resource":"services","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"pod-identity-webhook"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000173715155002766021553 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"33986e02-b6ec-4f8e-a7ae-90ba29b2aa03","resourceVersion":"794","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427115155002766016604 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"493143c6-e184-4d0d-9c65-92bc9055d94e","resourceVersion":"10643","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T12:41:25Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:41:25Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:41:26Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:41:25Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-13T12:41:25Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000773215155002766017674 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"d31515b0-e599-4423-aadf-dc116701392b","resourceVersion":"7317","generation":1,"creationTimestamp":"2026-03-13T12:30:55Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:37:34Z","reason":"AsExpected","message":"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.69.243:443/healthz\": dial tcp 172.30.69.243:443: connect: connection refused\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T12:38:23Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T12:37:34Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.69.243:443/healthz\": dial tcp 172.30.69.243:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T12:37:34Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T12:37:33Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"oauth-apiserver","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215155002766020203 0ustar0000000000000000[]config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315155002766023451 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"24eb473c-5f3d-4e23-8356-6cd052625f8d","resourceVersion":"4105","generation":1,"creationTimestamp":"2026-03-13T12:37:34Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-13T12:37:34Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-13T12:37:34Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-13T12:37:34Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015155002766022054 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"8d50266c-27a5-4d93-8145-797c3023d44a","resourceVersion":"4068","generation":1,"creationTimestamp":"2026-03-13T12:37:34Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-13T12:37:34Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-13T12:37:34Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-13T12:37:34Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/running_containers.json0000640000000000000000000000706015155002766015317 0ustar0000000000000000{"images":{"0":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","1":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","10":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","11":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","12":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","13":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","14":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","15":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","16":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","17":"sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","18":"sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","19":"sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7","2":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","20":"sha256:b714a7ada1e295b599b432f32e1fd5b74c8cdbe6fe51e95306322b25cb873914","21":"sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","22":"sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","23":"sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5","24":"sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916","25":"sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626","26":"sha256:042e6a37747405da54cf91543d44408c9531327a2cce653c41ca851aa7c896d8","27":"sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955","28":"sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3","29":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","3":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","30":"sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245","31":"sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","32":"sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9","33":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","34":"sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","35":"sha256:28f33d62fd0b94c5ea0ebcd7a4216848c8dd671a38d901ce98f4c399b700e1c7","36":"sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06","37":"sha256:b9b8bc43bac294be3c7669cde049e388ad9d8751242051ba40f83e1c401eceda","38":"sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","39":"sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e","4":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","40":"sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7","41":"sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","5":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","6":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","7":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","8":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","9":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460"},"containers":{"2026-03":{"0":11,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":1,"17":1,"18":1,"19":1,"2":6,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":4,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":3,"40":1,"41":1,"5":3,"6":2,"7":2,"8":2,"9":2}}}config/pod/openshift-network-operator/network-operator-7c649bf6d4-kh6n9.json0000640000000000000000000002514515155002766025376 0ustar0000000000000000{"metadata":{"name":"network-operator-7c649bf6d4-kh6n9","generateName":"network-operator-7c649bf6d4-","namespace":"openshift-network-operator","uid":"4dd0fc2f-f2ee-4447-a747-04a178288cf0","resourceVersion":"9136","creationTimestamp":"2026-03-13T12:35:30Z","labels":{"name":"network-operator","pod-template-hash":"7c649bf6d4"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-7c649bf6d4","uid":"97e5dcff-ac7b-4677-be77-f0a8a75ff6f6","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-fnw9d","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9242604e78efada5aeb232d73a7963f806b754213f5d92b1dffc9b493d7b5a65"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b19b9d0e5437b0bb19cafc3fb516f654c911cdf11184c0de9a27b43c6b80c9ce"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3aa7c84e73a2a19cc9baca38b7e86dfcde579aa88221647c332c83f047d5ae6d"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5bfe4d3125d98cc501d5a529d3ae2497106a2bbb5a6dd06df7c0e0930d168212"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b62afe74fdcb011a4a8c8fa5572dbab2514dda673ae4be4c6beaef92d28216ba"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-fnw9d","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:36:04Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:35:59Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:35:30Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T12:35:59Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-03-13T12:40:14Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"eled\nI0313 12:38:54.691177 1 log.go:245] reconciling (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter\nI0313 12:38:54.691244 1 log.go:245] could not apply (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: failed to apply / update (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0313 12:38:54.691260 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter\nI0313 12:38:54.691318 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0313 12:38:54.691349 1 log.go:245] reconciling (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script\nI0313 12:38:54.691487 1 log.go:245] could not apply (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: failed to apply / update (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: client rate limiter Wait returned an error: context canceled\nI0313 12:38:54.691527 1 log.go:245] reconciling (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter\nI0313 12:38:54.691644 1 log.go:245] could not apply (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: failed to apply / update (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0313 12:38:59.682183 1 observer_polling.go:162] Shutting down file observer\nF0313 12:39:24.684627 1 operator.go:133] Failed to start controller-runtime manager: failed waiting for all runnables to end within grace period of 30s: context deadline exceeded\nI0313 12:39:24.684896 1 internal.go:550] \"Stopping and waiting for caches\"\n","startedAt":"2026-03-13T12:36:04Z","finishedAt":"2026-03-13T12:39:24Z","containerID":"cri-o://638f7edbf4d5a7bd9c1277ff74b0deabee140db71794ce849e8ed2fe8e2bdb95"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","containerID":"cri-o://bc5551e07868e81855eed958b9e358bd0715e00cec588a7af2b93942471edb38","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-fnw9d","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-qg8q5.json0000640000000000000000000002463115155002766025645 0ustar0000000000000000{"metadata":{"name":"network-node-identity-qg8q5","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"1f43b4e7-5cd1-46d2-a02e-0d846b2e5182","resourceVersion":"9153","creationTimestamp":"2026-03-13T12:36:34Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"68cb6fd5b","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"c7970ec3-dd31-48b2-8b78-6049ad82c190","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-brzd4","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-brzd4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-brzd4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:36:51Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:36:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:36:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T12:36:34Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-03-13T12:40:14Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ds5kb for master-0 node in 4.798832ms\nI0313 12:36:57.054976 1 approver.go:230] Finished syncing CSR csr-ds5kb for unknown node in 53.641µs\nI0313 12:36:57.062942 1 approver.go:230] Finished syncing CSR csr-ds5kb for unknown node in 73.111µs\nI0313 12:37:09.516940 1 recorder.go:104] \"CSR \\\"csr-w9289\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-w9289\"} reason=\"CSRApproved\"\nI0313 12:37:09.523874 1 approver.go:230] Finished syncing CSR csr-w9289 for master-0 node in 7.170833ms\nI0313 12:37:09.524341 1 approver.go:230] Finished syncing CSR csr-w9289 for unknown node in 87.731µs\nI0313 12:37:09.533195 1 approver.go:230] Finished syncing CSR csr-w9289 for unknown node in 67.223µs\nE0313 12:39:07.119434 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded (Client.Timeout exceeded while awaiting headers), falling back to slow path\nE0313 12:39:22.119541 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0313 12:39:22.119665 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0313 12:39:37.120115 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nF0313 12:39:37.120416 1 ovnkubeidentity.go:309] error running approver: leader election lost\nI0313 12:39:37.120439 1 internal.go:538] \"Stopping and waiting for non leader election runnables\"\n","startedAt":"2026-03-13T12:36:51Z","finishedAt":"2026-03-13T12:39:37Z","containerID":"cri-o://8c3d9fdbcfd0987b6eb3f7869d1d1d034470ad27e956a473bf9fb468daecb5e8"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","containerID":"cri-o://b91c079b382f32d02d029d00309dfc5b4425807a136542a6d176792b503d743b","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-brzd4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-03-13T12:36:50Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","containerID":"cri-o://3517c3af357130acb419ebab94b4810d07459b4c08d3eb4cac75ac8012cf32fb","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-brzd4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001521215155002766026261 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"b8ea5ddc-a500-4ddf-b222-9d95778a2656","resourceVersion":"3885","creationTimestamp":"2026-03-13T12:36:59Z","labels":{"k8s-app":"kube-rbac-proxy-crio"},"annotations":{"kubernetes.io/config.hash":"e9add8df47182fc2eaf8cd78016ebe72","kubernetes.io/config.mirror":"e9add8df47182fc2eaf8cd78016ebe72","kubernetes.io/config.seen":"2026-03-13T12:34:54.823773964Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"c456d6c3-a916-4f05-9928-7e43433a4d22","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:25Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:25Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:25Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:25Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:25Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T12:37:25Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T12:35:00Z","finishedAt":"2026-03-13T12:35:00Z","containerID":"cri-o://d97124951202d97d2b090945a6d5c9c5add42850ba499052ed07d95631932324"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://d97124951202d97d2b090945a6d5c9c5add42850ba499052ed07d95631932324","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-03-13T12:35:46Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0313 12:35:21.283944 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0313 12:35:21.284096 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0313 12:35:21.285291 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-03-13T12:35:21Z","finishedAt":"2026-03-13T12:35:21Z","containerID":"cri-o://9c887f2b6cfcfcc1f3ea186daee81cbe3bce3c155cfd4e9bbac88f712c489339"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://958b1ab7ab943f0d9820d78ce8605298936c74cbbe3326599eac945aeec4ecce","started":true}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-677db989d6-ckl2j.json0000640000000000000000000002432515155002766025340 0ustar0000000000000000{"metadata":{"name":"ingress-operator-677db989d6-ckl2j","generateName":"ingress-operator-677db989d6-","namespace":"openshift-ingress-operator","uid":"2f79578c-bbfb-4968-893a-730deb4c01f9","resourceVersion":"9186","creationTimestamp":"2026-03-13T12:35:29Z","labels":{"name":"ingress-operator","pod-template-hash":"677db989d6"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.11/23\"],\"mac_address\":\"0a:58:0a:80:00:0b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.11/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.11\"\n ],\n \"mac\": \"0a:58:0a:80:00:0b\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-677db989d6","uid":"7832d45a-5296-4c58-a023-83cdbd2d5b13","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-f9hks","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-f9hks","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-f9hks","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:13Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:28Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:40:28Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.11","podIPs":[{"ip":"10.128.0.11"}],"startTime":"2026-03-13T12:37:21Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-03-13T12:40:28Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-13T12:40:27.103Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for webhooks\n2026-03-13T12:40:27.103Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for HTTP servers\nW0313 12:40:27.103463 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.FeatureGate ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0313 12:40:27.103486 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DaemonSet ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0313 12:40:27.103547 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DNSRecord ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0313 12:40:27.103619 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.ClusterOperator ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-13T12:40:27.103Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\n2026-03-13T12:40:27.103Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\n2026-03-13T12:40:27.111Z\tINFO\toperator.main\truntime/asm_amd64.s:1695\tfile watch events channel closed\n2026-03-13T12:40:27.111Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"failed to wait for route_metrics_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}\n","startedAt":"2026-03-13T12:38:13Z","finishedAt":"2026-03-13T12:40:27Z","containerID":"cri-o://6a8c75c694096fc8dedc129901064fbff36d84f9daf7b91e5a68c2b191c60f00"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","containerID":"cri-o://c36bf45a4804fa4ca98a882a198414395cc18ce172e9fe0b2eeeacf2ec4ae9ef","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-f9hks","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-13T12:38:13Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://e4eaaa3731593381d12110c6e2099dda3ebd595d5815de35f934386e31a23ac2","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-f9hks","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator-8565d84698-hj2wk.json0000640000000000000000000002046215155002766033377 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-8565d84698-hj2wk","generateName":"openshift-controller-manager-operator-8565d84698-","namespace":"openshift-controller-manager-operator","uid":"8c62b15f-001a-4b64-b85f-348aefde5d1b","resourceVersion":"9107","creationTimestamp":"2026-03-13T12:35:29Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"8565d84698"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.18/23\"],\"mac_address\":\"0a:58:0a:80:00:12\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.18/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.18\"\n ],\n \"mac\": \"0a:58:0a:80:00:12\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-8565d84698","uid":"b274a169-e5b2-4aa0-a5b3-d5371cbb6a4e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-8cf2v","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-8cf2v","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c15,c0"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:26Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:39:01Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:39:01Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.18","podIPs":[{"ip":"10.128.0.18"}],"startTime":"2026-03-13T12:37:21Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-03-13T12:39:00Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ft-controller-manager-operator\", Name:\"openshift-controller-manager-operator\", UID:\"2d89ccef-f8c5-4252-aae7-e4b873fc221f\", APIVersion:\"apps/v1\", ResourceVersion:\"\", FieldPath:\"\"}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\" to \"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3.\",Available changed from False to True (\"All is well\"),status.versions changed from [] to [{\"operator\" \"4.18.34\"}]\nI0313 12:38:59.534036 1 observer_polling.go:111] Observed file \"/var/run/secrets/serving-cert/tls.crt\" has been created (hash=\"cba45c776f3c60a166562c9bd81469f561714cc49ddb9c47cbcdf5c32860ce6e\")\nW0313 12:38:59.534204 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created\nI0313 12:38:59.534306 1 observer_polling.go:111] Observed file \"/var/run/secrets/serving-cert/tls.key\" has been created (hash=\"96e6712a6535a4b6cf4b7c31fb1844c09e3a02ec089b5866eb4368a33ff5ca74\")\nI0313 12:38:59.534357 1 genericapiserver.go:691] \"[graceful-termination] pre-shutdown hooks completed\" name=\"PreShutdownHooksStopped\"\nI0313 12:38:59.534511 1 genericapiserver.go:546] \"[graceful-termination] shutdown event\" name=\"ShutdownInitiated\"\nI0313 12:38:59.534530 1 operator.go:151] Shutting down OpenShiftControllerManagerOperator\nW0313 12:38:59.534635 1 builder.go:136] graceful termination failed, controllers failed with error: stopped\n","startedAt":"2026-03-13T12:37:39Z","finishedAt":"2026-03-13T12:38:59Z","containerID":"cri-o://50a86534e82c318c07e40c2eda167d8236002efbe5ace1ee2b94525f4f64c25b"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","containerID":"cri-o://0c1cf11fba8779c80d0da5e273c773daa5eb397179aa4efedaa5ea11988b99ed","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-8cf2v","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-config-operator/openshift-config-operator-64488f9d78-t8fb4.json0000640000000000000000000002263115155002766026565 0ustar0000000000000000{"metadata":{"name":"openshift-config-operator-64488f9d78-t8fb4","generateName":"openshift-config-operator-64488f9d78-","namespace":"openshift-config-operator","uid":"f0803181-4e37-43fa-8ddc-9c76d3f61817","resourceVersion":"6222","creationTimestamp":"2026-03-13T12:35:29Z","labels":{"app":"openshift-config-operator","pod-template-hash":"64488f9d78"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.6/23\"],\"mac_address\":\"0a:58:0a:80:00:06\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.6/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.6\"\n ],\n \"mac\": \"0a:58:0a:80:00:06\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-config-operator-64488f9d78","uid":"e1ef2cb2-d4a9-4d8a-ae0c-6aa21ec76561","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"config-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"available-featuregates","emptyDir":{"sizeLimit":"100Mi"}},{"name":"kube-api-access-lwkdj","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"openshift-api","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","command":["write-available-featuresets","--asset-output-dir=/available-featuregates","--payload-version=$(OPERATOR_IMAGE_VERSION)"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-lwkdj","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"containers":[{"name":"openshift-config-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","command":["cluster-config-operator","operator","--operator-version=$(OPERATOR_IMAGE_VERSION)","--authoritative-feature-gate-dir=/available-featuregates"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-lwkdj","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-config-operator","serviceAccount":"openshift-config-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c9"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:26Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:02Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:02Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:37:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.6","podIPs":[{"ip":"10.128.0.6"}],"startTime":"2026-03-13T12:37:20Z","initContainerStatuses":[{"name":"openshift-api","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T12:37:47Z","finishedAt":"2026-03-13T12:37:47Z","containerID":"cri-o://876f570e7bca1677304688ecd8e1a442c714ddc31318f4b0812aca0943ba9d82"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","containerID":"cri-o://876f570e7bca1677304688ecd8e1a442c714ddc31318f4b0812aca0943ba9d82","started":false,"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-lwkdj","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"openshift-config-operator","state":{"running":{"startedAt":"2026-03-13T12:37:59Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"W0313 12:37:57.991920 1 cmd.go:254] Using insecure, self-signed certificates\nI0313 12:37:58.652790 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0313 12:37:58.656428 1 observer_polling.go:159] Starting file observer\nI0313 12:37:58.656547 1 observer_polling.go:120] Observed file \"/var/run/secrets/serving-cert/tls.crt\" has been modified (old=\"\", new=\"ed91d763ae6b277a2f8cd276576cca571dc61a57637099b0d403ccde6f79869f\")\nW0313 12:37:58.656575 1 builder.go:154] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was modified\nI0313 12:37:58.656640 1 observer_polling.go:120] Observed file \"/var/run/secrets/serving-cert/tls.key\" has been modified (old=\"\", new=\"2ebd5b3d83dadb7b436456620140f0813a11560a05194a8a562a1257699e3625\")\nW0313 12:37:58.656780 1 builder.go:266] unable to get owner reference (falling back to namespace): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-config-operator/pods\": context canceled\nI0313 12:37:58.656907 1 builder.go:298] config-operator version 4.18.0-202602132343.p2.gfe5e928.assembly.stream.el9-fe5e928-fe5e928628200b49a07aa50e4dfa634fb9452607\nF0313 12:37:59.151282 1 cmd.go:179] failed checking apiserver connectivity: client rate limiter Wait returned an error: context canceled\n","startedAt":"2026-03-13T12:37:57Z","finishedAt":"2026-03-13T12:37:59Z","containerID":"cri-o://6b3b1b1d996a5cfa81d2f82133cbb61df8d0101269e29c3d8745b628b44289f9"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","containerID":"cri-o://d775030cc9a2d771094d53b9310bcf873da42c7c6da6ec2e4bea962d923e448e","started":true,"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-lwkdj","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-version/cluster-version-operator-8c9c967c7-98tv2.json0000640000000000000000000001341415155002766026470 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-8c9c967c7-98tv2","generateName":"cluster-version-operator-8c9c967c7-","namespace":"openshift-cluster-version","uid":"676b054a-e76f-425d-a6ff-3f1bea8b523e","resourceVersion":"8409","creationTimestamp":"2026-03-13T12:38:29Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"8c9c967c7"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-8c9c967c7","uid":"84d78a97-1a2e-4031-b42c-9cdfbb9738f3","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:29Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:29Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:29Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:29Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T12:38:29Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T12:38:29Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-03-13T12:38:29Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","containerID":"cri-o://01758a85bcc236e4926066681b9aa0286d195458c1cddadcb630f791db70a4ff","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415155002766011031 0ustar0000000000000000e6fab300-515d-4384-8329-e5d21d121c3econfig/version.json0000640000000000000000000000724515155002766013104 0ustar0000000000000000{"metadata":{"name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","resourceVersion":"10513","generation":2,"creationTimestamp":"2026-03-13T12:30:18Z"},"spec":{"clusterID":"e6fab300-515d-4384-8329-e5d21d121c3e","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.34","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","url":"https://access.redhat.com/errata/RHSA-2026:2977","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","fast-4.19","stable-4.18","stable-4.19"]},"history":[{"state":"Partial","startedTime":"2026-03-13T12:30:55Z","completionTime":null,"version":"4.18.34","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","verified":false}],"observedGeneration":2,"versionHash":"p13mOMOOYQo=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-03-13T12:30:55Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-03-13T12:30:55Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-03-13T12:30:55Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-03-13T12:30:55Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T12:30:55Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-03-13T12:40:48Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, baremetal, cloud-controller-manager, cloud-credential, cluster-autoscaler, control-plane-machine-set, etcd, image-registry, insights, kube-apiserver, kube-controller-manager, kube-scheduler, machine-api, machine-approver, machine-config, monitoring, openshift-apiserver, openshift-samples, operator-lifecycle-manager-packageserver, storage are not available\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 908): the server is down or not responding\n* Could not update oauthclient \"console\" (550 of 908): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (825 of 908): resource may have been deleted\n* Could not update role \"openshift-console/prometheus-k8s\" (829 of 908): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T12:30:55Z","reason":"MultipleErrors","message":"Unable to apply 4.18.34: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002215615155002766025507 0ustar0000000000000000{"metadata":{"name":"edit","uid":"56d319c4-9088-4e63-9291-046d3db15676","resourceVersion":"7294","creationTimestamp":"2026-03-13T12:29:19Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002504315155002766025650 0ustar0000000000000000{"metadata":{"name":"admin","uid":"e4e5fae9-6501-4980-8d23-86a7c3f6fa7c","resourceVersion":"7298","creationTimestamp":"2026-03-13T12:29:19Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615155002766027505 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"4fc779c2-af0c-4d5d-b94b-76dbbdfa9389","resourceVersion":"5171","generation":2,"creationTimestamp":"2026-03-13T12:37:45Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115155002766025303 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"304dbb9a-cd6a-433e-bcfd-161a86564763","resourceVersion":"5173","generation":2,"creationTimestamp":"2026-03-13T12:31:24Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515155002766026742 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"456498c5-1b8c-458f-bdaa-94e7b2db4db0","resourceVersion":"7097","generation":1,"creationTimestamp":"2026-03-13T12:38:20Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"7e9152e6-38e3-4536-8603-a138d1af3fd0","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715155002766024030 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"d7133993-6044-4bff-b398-13bca73c0c3e","resourceVersion":"5172","generation":2,"creationTimestamp":"2026-03-13T12:36:19Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"7e9152e6-38e3-4536-8603-a138d1af3fd0","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500215155002766032114 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"b2552531-2636-44a6-a3f8-eb7f7844ce39","resourceVersion":"10658","generation":2,"creationTimestamp":"2026-03-13T12:41:26Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102715155002766025001 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"b1103388-89b3-451f-b9da-e89a7857ddd8","resourceVersion":"10582","generation":2,"creationTimestamp":"2026-03-13T12:41:22Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/apiserver.json0000640000000000000000000000121615155002766013407 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"121114e2-5de8-40f8-a947-f7fbfdd5ded8","resourceVersion":"962","generation":1,"creationTimestamp":"2026-03-13T12:30:59Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115155002766027755 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"d2d2d2aa-99a1-4321-ab31-0e4a0f303f1d","resourceVersion":"6691","generation":1,"creationTimestamp":"2026-03-13T12:38:13Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T12:38:14Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-03-13T12:38:14Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-03-13T12:38:14Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T12:38:14Z","reason":"AsExpected"}]}}config/oauth.json0000640000000000000000000000114415155002766012527 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"496a2884-a60c-4eb4-a0d6-134947903c3e","resourceVersion":"1618","generation":1,"creationTimestamp":"2026-03-13T12:31:13Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/featuregate.json0000640000000000000000000000613615155002766013711 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"45870374-5329-440f-8999-dba456019de6","resourceVersion":"647","generation":1,"creationTimestamp":"2026-03-13T12:30:35Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.34","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/schedulers/cluster.json0000640000000000000000000000052415155002766015232 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"4d510ec7-4060-4752-98b2-9b7c9ddc8438","resourceVersion":"565","generation":1,"creationTimestamp":"2026-03-13T12:30:16Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/machineconfigpools/worker.json0000640000000000000000000000106615155002766016572 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-13T12:40:55Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"10406","uid":"8a4ee6ab-71fa-4319-95fe-3a91d5b9ca14"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false}}config/machineconfigpools/master.json0000640000000000000000000000117315155002766016553 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-13T12:40:55Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"10405","uid":"abbf1662-d247-4195-b0ba-53c6a3c6afe3"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false}}config/node/master-0.json0000640000000000000000000000605215155002766013767 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"c456d6c3-a916-4f05-9928-7e43433a4d22","resourceVersion":"10638","creationTimestamp":"2026-03-13T12:35:28Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","machineconfiguration.openshift.io/reason":"could not get ControllerConfig: controllerconfig.machineconfiguration.openshift.io \"machine-config-controller\" not found","machineconfiguration.openshift.io/state":"Degraded","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{"taints":[{"key":"node-role.kubernetes.io/master","effect":"NoSchedule"}]},"status":{"capacity":{"cpu":"12","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"32865360Ki","pods":"250"},"allocatable":{"cpu":"11500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"31714384Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-03-13T12:40:38Z","lastTransitionTime":"2026-03-13T12:35:28Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-03-13T12:40:38Z","lastTransitionTime":"2026-03-13T12:35:28Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-03-13T12:40:38Z","lastTransitionTime":"2026-03-13T12:35:28Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-03-13T12:40:38Z","lastTransitionTime":"2026-03-13T12:37:20Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.111.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202602172219-0","containerRuntimeVersion":"cri-o://1.31.13-8.rhaos4.18.gitd78977c.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}config/infrastructure.json0000640000000000000000000000106515155002766014471 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"9b3da66b-cd06-4dd3-8f4a-77300425f49f","resourceVersion":"542","generation":1,"creationTimestamp":"2026-03-13T12:30:12Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/ingress.json0000640000000000000000000000043615155002766013064 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"177e0f40-9f30-43b6-9b35-44bd4d9f7a7a","resourceVersion":"555","generation":1,"creationTimestamp":"2026-03-13T12:30:13Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000174115155002766025124 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"8eb9763e-7e05-4785-a557-431f19d3a54c","resourceVersion":"10294","generation":1,"creationTimestamp":"2026-03-13T12:31:14Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":0,"currentHealthy":0,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"False","observedGeneration":1,"lastTransitionTime":"2026-03-13T12:31:14Z","reason":"InsufficientPods","message":""}]}}config/network.json0000640000000000000000000000117015155002766013077 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"f9d7f431-295d-4d14-9dfe-501fdc7bed09","resourceVersion":"3252","generation":2,"creationTimestamp":"2026-03-13T12:30:14Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/authentication.json0000640000000000000000000000116515155002766014431 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"46e9c1a5-10ba-48bd-ad40-4994783fb054","resourceVersion":"1197","generation":1,"creationTimestamp":"2026-03-13T12:31:05Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582"}]},"spec":{"type":"","oauthMetadata":{"name":""},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/image.json0000640000000000000000000000111715155002766012471 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"7e3fa850-c7df-4c6f-a03b-d011a5087f73","resourceVersion":"1412","generation":1,"creationTimestamp":"2026-03-13T12:31:11Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"61b0117e-65cb-4778-9698-6161bba05582"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/proxy.json0000640000000000000000000000031315155002766012565 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"1e73a744-9bc2-4470-bb8b-f6f557bb6811","resourceVersion":"560","generation":1,"creationTimestamp":"2026-03-13T12:30:14Z"},"spec":{"trustedCA":{"name":""}},"status":{}}