insights-operator/gathers.json0000640000000000000000000004276515157203674015301 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":23,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":55,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/version","duration_in_ms":158,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":48,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":35,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":23917,"records_count":164,"errors":["function \"pod_network_connectivity_checks\" failed with an error","function \"machine_autoscalers\" failed with an error","function \"metrics\" failed with an error","function \"silenced_alerts\" failed with an error","function \"tsdb_status\" failed with an error","function \"active_alerts\" failed with an error","function \"support_secret\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-62zrx.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-brhw4.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-brhw4/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-brhw4/etcd-operator_current.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-p7pt6.json\""],"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":5741,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":48,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":57,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":123,"records_count":4,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":12,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":159,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/operators","duration_in_ms":324,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":23,"records_count":0,"errors":["machineautoscalers.autoscaling.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machineautoscalers\" in API group \"autoscaling.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":42,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":55,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":58,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":59,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":54,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":55,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":9,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":23707,"records_count":77,"errors":["the record with the same name \"config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-62zrx.json\" was already recorded and had the fingerprint \"76057848c4f0917ff7c2c4792a0b51a4b17ff478c27cfb329355ed027bd7ba0f\", overwriting with the record having fingerprint \"76057848c4f0917ff7c2c4792a0b51a4b17ff478c27cfb329355ed027bd7ba0f\"","the record with the same name \"config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json\" was already recorded and had the fingerprint \"8a85ebea3c790fed88bcf879adb83c6a67f51996862cfcc0c26c84678d6962f8\", overwriting with the record having fingerprint \"8a85ebea3c790fed88bcf879adb83c6a67f51996862cfcc0c26c84678d6962f8\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-brhw4.json\" was already recorded and had the fingerprint \"3d15c9f169f0c3d1f467b27c4d105e2ac83cdeeb9d268ed3113ea9425439a013\", overwriting with the record having fingerprint \"3d15c9f169f0c3d1f467b27c4d105e2ac83cdeeb9d268ed3113ea9425439a013\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-brhw4/etcd-operator_previous.log\" was already recorded and had the fingerprint \"bfb90633dddde304df14a3a6958215c54e6eda1dc6f114499a35d01e7e04dd40\", overwriting with the record having fingerprint \"bfb90633dddde304df14a3a6958215c54e6eda1dc6f114499a35d01e7e04dd40\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-brhw4/etcd-operator_current.log\" was already recorded and had the fingerprint \"6bb0f5063e5b388dacbf34279f51b81a12c0149a5d751274c5a4180c0e44191f\", overwriting with the record having fingerprint \"6bb0f5063e5b388dacbf34279f51b81a12c0149a5d751274c5a4180c0e44191f\"","the record with the same name \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-p7pt6.json\" was already recorded and had the fingerprint \"8e0a15cda39090385ba30fa82c5b5140b2a50c460c585c14432c24d06b1a2207\", overwriting with the record having fingerprint \"8e0a15cda39090385ba30fa82c5b5140b2a50c460c585c14432c24d06b1a2207\""],"warnings":["warning: the record with the same fingerprint \"76057848c4f0917ff7c2c4792a0b51a4b17ff478c27cfb329355ed027bd7ba0f\" was already recorded at path \"config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-62zrx.json\", recording another one with a different path \"config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-62zrx.json\"","warning: the record with the same fingerprint \"8a85ebea3c790fed88bcf879adb83c6a67f51996862cfcc0c26c84678d6962f8\" was already recorded at path \"config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json\", recording another one with a different path \"config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json\"","warning: the record with the same fingerprint \"3d15c9f169f0c3d1f467b27c4d105e2ac83cdeeb9d268ed3113ea9425439a013\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-brhw4.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-brhw4.json\"","warning: the record with the same fingerprint \"bfb90633dddde304df14a3a6958215c54e6eda1dc6f114499a35d01e7e04dd40\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-brhw4/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-brhw4/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"6bb0f5063e5b388dacbf34279f51b81a12c0149a5d751274c5a4180c0e44191f\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-brhw4/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-brhw4/etcd-operator_current.log\"","warning: the record with the same fingerprint \"8e0a15cda39090385ba30fa82c5b5140b2a50c460c585c14432c24d06b1a2207\" was already recorded at path \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-p7pt6.json\", recording another one with a different path \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-p7pt6.json\""],"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":37,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":38,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":17,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":132,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":35,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":58,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":36,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":856,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":82,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":148,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":5741,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":27,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":56,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":11,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":54,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":47,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":57,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":31,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":31,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":56,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":328,"records_count":8,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":84,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":153,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":413,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":47,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":48,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":22,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":35,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":209,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":23915,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":49,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":34,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":156,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":317,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":59,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":30,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":10879,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":11606,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":26,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":46,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":48,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":12,"records_count":0,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":31.925,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515157203674017774 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515157203674021076 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005563715157203673014266 0ustar0000000000000000{"pods":80,"imageCount":67,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:6bec6e4ce9b3ff60658829df2f5980cf947458d49b97476cee1ff01ec638d309","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:542b8eae269892bc6f0f9d5ab808afe26119a72e430870d81f59faf93c3f2f18","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:632e80bba5077068ecca05fddb95aedebad4493af6f36152c01c6ae490975b62","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:898c67bf7fc973e99114f3148976a6c21ae0dbe413051415588fa9b995f5b331","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:4869c69128f74d9c3b178ea6c8c8d38df169b6bce05eb821a65f0aaf514c563a","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":1,"shapes":[{"restartAlways":false,"containers":[{"imageID":"sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","firstCommand":"WFJEBSInAJpw","firstArg":"gcNszUTvGLqr"}]}]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:30a2f97d7785ce8b0ea5115e67c4554b64adefbc7856bcf6f4fe6cc7e938a310","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:7c527b4e8239a1f4f4e0a851113e7dd633b7dcb9d75b0e7b21c23d26304abcb3","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":1,"shapes":[{"restartAlways":false,"containers":[{"imageID":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","firstCommand":"FATPL2W-sitV","firstArg":"gcNszUTvGLqr"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:82f2c59d19eb73ad5c0f93b0a63003c1885f5297959c9c45b401d1a74aea6e76","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1973d56a1097a48ea0ebf2c4dbae1ed86fa67bb0116f4962f7720d48aa337d27","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ea5c8a93f30e0a4932da5697d22c0da7eda9a7035c0555eb006b6755e62bb2fc","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ab745a9e15dadc862548ceb5740b8f5d02075232760c6715d82b4c3b70eddca9","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:ab745a9e15dadc862548ceb5740b8f5d02075232760c6715d82b4c3b70eddca9","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:cdd28dfe7132e19af9f013f72cf120d970bc31b6b74693af262f8d2e82a096e1","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:112a03f2411f871cdaca5f20daef71024dac710113d5f30897117a5a02f6b6f5","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:112a03f2411f871cdaca5f20daef71024dac710113d5f30897117a5a02f6b6f5","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ce8e3088493b4a72dd766b3b5b4ccb83b7d72d514bbf64063a913dfe961273db","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:908eaaf624959bc7645f6d585d160431d1efb070e9a1f37fefed73a3be42b0d3","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:de91abd5ad76fb491881a75a0feb4b8ca5600ceb5e15a4b0b687ada01ea0a44c","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","firstCommand":"zT6_GoC4_8OY","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"aC8iSHmKHojh","firstArg":"eE7ekwlit3Mq"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":6,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a746a87b784ea1caa278fd0e012554f9df520b6fff665ea0bc4c83f487fed113","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:f264240fe2a46d7aa95e56ee202a8403c3dad6c220cf29caff0936c82e0c086f","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:0bccc03fd9ffe278e15c8f4be1db030307e4cd5020b78d711fc62f104fd6a980","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:0bccc03fd9ffe278e15c8f4be1db030307e4cd5020b78d711fc62f104fd6a980","firstCommand":"icTsn2s_EIax","firstArg":"SCcKjYHEPDKM"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:96ae39329a45e017d3444b3794dc95126641ca54fe645bb8729b3d501bd47c64","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9174864cd47431966d033d283bc7836e7ca579139ef85c36275db542fda80803","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:97c7a635130c574a2c501091bb44f17cd92e05e29b5102e59578b5885d9bfec0","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7af9f5c5af9d529840233ef4b519120cc0e3f14c4fe28cc43b0823f2c11d8f89","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","firstArg":"zO0oxtw_mcI5"}]}]}}}config/image.json0000640000000000000000000000111715157203665012474 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"39367774-32f8-4755-89be-9bf142b57711","resourceVersion":"1334","generation":1,"creationTimestamp":"2026-03-20T08:30:33Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}packageserver_current.log0000640000000000000000000011600615157203665034012 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-6c85f64bb9-fmpsg2026-03-20T08:37:14.553490697Z W0320 08:37:14.553419 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.21.176:50051: connect: connection refused" 2026-03-20T08:37:14.624124468Z E0320 08:37:14.624070 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:14.624245962Z E0320 08:37:14.624173 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:14.624496459Z E0320 08:37:14.624475 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:14.624652564Z E0320 08:37:14.624627 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:14.624808068Z E0320 08:37:14.624786 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:15.768403772Z time="2026-03-20T08:37:15Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-20T08:37:15.768403772Z time="2026-03-20T08:37:15Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.186.223:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-03-20T08:37:16.341950860Z time="2026-03-20T08:37:16Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-20T08:37:16.341997311Z time="2026-03-20T08:37:16Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.48.104:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2026-03-20T08:37:16.699489534Z W0320 08:37:16.699430 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.186.223:50051: connect: connection refused" 2026-03-20T08:37:16.780871749Z W0320 08:37:16.780813 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.48.104:50051: connect: connection refused" 2026-03-20T08:37:17.133831278Z W0320 08:37:17.133736 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.21.176:50051: connect: connection refused" 2026-03-20T08:37:17.192304494Z E0320 08:37:17.192229 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:17.192590753Z E0320 08:37:17.192565 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:17.192801549Z E0320 08:37:17.192777 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:17.192949773Z E0320 08:37:17.192918 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:17.193073007Z E0320 08:37:17.193051 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:17.195070245Z W0320 08:37:17.195031 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.118.101:50051: connect: connection refused" 2026-03-20T08:37:21.030605237Z W0320 08:37:21.030535 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.118.101:50051: connect: connection refused" 2026-03-20T08:37:21.381948450Z W0320 08:37:21.381894 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.186.223:50051: connect: connection refused" 2026-03-20T08:37:21.454536508Z W0320 08:37:21.453739 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.48.104:50051: connect: connection refused" 2026-03-20T08:37:21.957386133Z W0320 08:37:21.957304 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.21.176:50051: connect: connection refused" 2026-03-20T08:37:22.326760032Z E0320 08:37:22.325408 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:22.326760032Z E0320 08:37:22.325479 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:22.326760032Z E0320 08:37:22.325544 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:22.326760032Z E0320 08:37:22.325598 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:22.326760032Z E0320 08:37:22.325780 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:27.550747763Z W0320 08:37:27.550647 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.118.101:50051: connect: connection refused" 2026-03-20T08:37:28.499417327Z W0320 08:37:28.499339 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.186.223:50051: connect: connection refused" 2026-03-20T08:37:29.790664069Z W0320 08:37:29.790564 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.21.176:50051: connect: connection refused" 2026-03-20T08:37:29.790664069Z W0320 08:37:29.790565 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.48.104:50051: connect: connection refused" 2026-03-20T08:37:30.498701031Z E0320 08:37:30.498639 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:30.498949118Z E0320 08:37:30.498900 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:30.498981939Z E0320 08:37:30.498788 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:30.499312509Z E0320 08:37:30.498807 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:30.499390551Z E0320 08:37:30.498858 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:32.572644464Z E0320 08:37:32.572552 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:32.572781828Z E0320 08:37:32.572748 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:32.573015875Z E0320 08:37:32.572674 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:32.573220631Z E0320 08:37:32.573200 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:32.573515999Z E0320 08:37:32.573497 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:37:37.399357830Z W0320 08:37:37.399291 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.118.101:50051: connect: connection refused" 2026-03-20T08:37:39.918607908Z W0320 08:37:39.918350 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.21.176:50051: connect: connection refused" 2026-03-20T08:37:40.935520335Z W0320 08:37:40.935431 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.186.223:50051: connect: connection refused" 2026-03-20T08:37:41.063550751Z W0320 08:37:41.063484 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.48.104:50051: connect: connection refused" 2026-03-20T08:37:50.933307396Z W0320 08:37:50.933239 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.118.101:50051: connect: connection refused" 2026-03-20T08:37:54.983091780Z W0320 08:37:54.982997 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.48.104:50051: connect: connection refused" 2026-03-20T08:37:58.129996755Z W0320 08:37:58.129869 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.186.223:50051: connect: connection refused" 2026-03-20T08:37:58.942588529Z W0320 08:37:58.942470 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.21.176:50051: connect: connection refused" 2026-03-20T08:38:00.532266760Z E0320 08:38:00.530153 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.532266760Z E0320 08:38:00.530550 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.532266760Z E0320 08:38:00.530736 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.532266760Z E0320 08:38:00.530909 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.532266760Z E0320 08:38:00.531100 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.558311200Z E0320 08:38:00.558235 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.565274753Z E0320 08:38:00.563747 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:02.580540405Z E0320 08:38:02.580431 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:02.580540405Z E0320 08:38:02.580452 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:02.580540405Z E0320 08:38:02.580494 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:02.580907346Z E0320 08:38:02.580638 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:02.580907346Z E0320 08:38:02.580752 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:18.900275498Z W0320 08:38:18.900131 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.118.101:50051: connect: connection refused" 2026-03-20T08:38:19.775314884Z W0320 08:38:19.775108 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.48.104:50051: connect: connection refused" 2026-03-20T08:38:21.921414982Z W0320 08:38:21.921339 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.21.176:50051: connect: connection refused" 2026-03-20T08:38:23.891293609Z W0320 08:38:23.891175 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.186.223:50051: connect: connection refused" 2026-03-20T08:38:30.507523319Z E0320 08:38:30.505567 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:30.507523319Z E0320 08:38:30.505593 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:30.507523319Z E0320 08:38:30.505943 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:30.507523319Z E0320 08:38:30.505949 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:30.507523319Z E0320 08:38:30.505978 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:32.590472605Z E0320 08:38:32.590275 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:32.590472605Z E0320 08:38:32.590353 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:32.590472605Z E0320 08:38:32.590440 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:32.590550537Z E0320 08:38:32.590485 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:32.590550537Z E0320 08:38:32.590535 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:57.083433386Z W0320 08:38:57.083366 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.118.101:50051: connect: connection refused" 2026-03-20T08:38:57.363707265Z W0320 08:38:57.363639 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.48.104:50051: connect: connection refused" 2026-03-20T08:38:57.864896411Z W0320 08:38:57.864159 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.21.176:50051: connect: connection refused" 2026-03-20T08:39:00.516341688Z E0320 08:39:00.511959 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.516341688Z E0320 08:39:00.512541 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.516341688Z E0320 08:39:00.512941 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.516341688Z E0320 08:39:00.513341 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.516341688Z E0320 08:39:00.513772 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.535594370Z E0320 08:39:00.535527 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.541970456Z E0320 08:39:00.541910 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:02.599039486Z E0320 08:39:02.598960 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:02.599118549Z E0320 08:39:02.599067 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:02.599203211Z E0320 08:39:02.598960 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:02.599236922Z E0320 08:39:02.599165 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:02.599633254Z E0320 08:39:02.599616 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:09.193315825Z time="2026-03-20T08:39:09Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-20T08:39:09.193478580Z time="2026-03-20T08:39:09Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.186.223:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-03-20T08:39:09.398964686Z time="2026-03-20T08:39:09Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-20T08:39:09.398964686Z time="2026-03-20T08:39:09Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.48.104:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2026-03-20T08:39:11.459320764Z W0320 08:39:11.457978 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.186.223:50051: connect: connection refused" 2026-03-20T08:39:11.982992395Z time="2026-03-20T08:39:11Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-20T08:39:11.983051707Z time="2026-03-20T08:39:11Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.118.101:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-03-20T08:39:12.182382724Z time="2026-03-20T08:39:12Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-20T08:39:12.182435515Z time="2026-03-20T08:39:12Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.21.176:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" package-server-manager_current.log0000640000000000000000000003175715157203665036607 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-7b95f86987-2pg772026-03-20T08:37:04.309866020Z 2026-03-20T08:37:04Z INFO setup starting manager 2026-03-20T08:37:04.316568796Z 2026-03-20T08:37:04Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-03-20T08:37:04.316736301Z 2026-03-20T08:37:04Z INFO controller-runtime.metrics Starting metrics server 2026-03-20T08:37:04.316736301Z 2026-03-20T08:37:04Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-03-20T08:37:04.317133532Z 2026-03-20T08:37:04Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-03-20T08:37:04.317213595Z I0320 08:37:04.317091 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-03-20T08:37:04.343237764Z I0320 08:37:04.342687 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-03-20T08:37:04.347207970Z 2026-03-20T08:37:04Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-03-20T08:37:04.347207970Z 2026-03-20T08:37:04Z DEBUG events package-server-manager-7b95f86987-2pg77_48be34a1-8287-4af5-a0e6-3e5bb9d5e838 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"a9876261-2b94-4a30-963d-829458af3155","apiVersion":"coordination.k8s.io/v1","resourceVersion":"7738"}, "reason": "LeaderElection"} 2026-03-20T08:37:04.347207970Z 2026-03-20T08:37:04Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-03-20T08:37:04.347207970Z 2026-03-20T08:37:04Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-03-20T08:37:04.468458789Z 2026-03-20T08:37:04Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-03-20T08:37:04.471073715Z 2026-03-20T08:37:04Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-03-20T08:37:04.471420325Z 2026-03-20T08:37:04Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-20T08:37:04.471420325Z 2026-03-20T08:37:04Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:04.789279661Z 2026-03-20T08:37:04Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:04.790105485Z 2026-03-20T08:37:04Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-20T08:37:04.835784548Z 2026-03-20T08:37:04Z INFO controllers.packageserver attempting to create the packageserver csv 2026-03-20T08:37:04.849307473Z 2026-03-20T08:37:04Z INFO controllers.packageserver updating csv spec 2026-03-20T08:37:04.866415572Z 2026-03-20T08:37:04Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2026-03-20T08:37:04.866415572Z 2026-03-20T08:37:04Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:04.868324508Z 2026-03-20T08:37:04Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-20T08:37:04.868324508Z 2026-03-20T08:37:04Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:04.868428111Z 2026-03-20T08:37:04Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:04.868437141Z 2026-03-20T08:37:04Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-20T08:37:04.928299128Z 2026-03-20T08:37:04Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-20T08:37:04.928299128Z 2026-03-20T08:37:04Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:04.928299128Z 2026-03-20T08:37:04Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-20T08:37:04.928299128Z 2026-03-20T08:37:04Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:04.928299128Z 2026-03-20T08:37:04Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:04.928299128Z 2026-03-20T08:37:04Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-20T08:37:05.014269107Z 2026-03-20T08:37:05Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-20T08:37:05.014269107Z 2026-03-20T08:37:05Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:05.014269107Z 2026-03-20T08:37:05Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-20T08:37:05.014269107Z 2026-03-20T08:37:05Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:05.014269107Z 2026-03-20T08:37:05Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:05.014269107Z 2026-03-20T08:37:05Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-20T08:37:05.055377167Z 2026-03-20T08:37:05Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-20T08:37:05.055377167Z 2026-03-20T08:37:05Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:05.055377167Z 2026-03-20T08:37:05Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-20T08:37:05.055377167Z 2026-03-20T08:37:05Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:05.055377167Z 2026-03-20T08:37:05Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:05.055377167Z 2026-03-20T08:37:05Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-20T08:37:05.073052982Z 2026-03-20T08:37:05Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-20T08:37:05.073052982Z 2026-03-20T08:37:05Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:06.049225390Z 2026-03-20T08:37:06Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-20T08:37:06.049225390Z 2026-03-20T08:37:06Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:06.049546430Z 2026-03-20T08:37:06Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:06.049635192Z 2026-03-20T08:37:06Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-20T08:37:06.079303508Z 2026-03-20T08:37:06Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-20T08:37:06.079303508Z 2026-03-20T08:37:06Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:07.474308547Z 2026-03-20T08:37:07Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-20T08:37:07.474308547Z 2026-03-20T08:37:07Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:07.474308547Z 2026-03-20T08:37:07Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:07.474308547Z 2026-03-20T08:37:07Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-20T08:37:07.520241498Z 2026-03-20T08:37:07Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-20T08:37:07.520241498Z 2026-03-20T08:37:07Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:07.714591209Z 2026-03-20T08:37:07Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-20T08:37:07.714591209Z 2026-03-20T08:37:07Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:07.714654631Z 2026-03-20T08:37:07Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:37:07.714724313Z 2026-03-20T08:37:07Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-20T08:37:07.746913263Z 2026-03-20T08:37:07Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-20T08:37:07.746913263Z 2026-03-20T08:37:07Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-20T08:38:38.367460484Z E0320 08:38:38.367351 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path kube-rbac-proxy_current.log0000640000000000000000000000160415157203665035276 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-7b95f86987-2pg772026-03-20T08:36:48.164435253Z W0320 08:36:48.164217 1 deprecated.go:66] 2026-03-20T08:36:48.164435253Z ==== Removed Flag Warning ====================== 2026-03-20T08:36:48.164435253Z 2026-03-20T08:36:48.164435253Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-20T08:36:48.164435253Z 2026-03-20T08:36:48.164435253Z =============================================== 2026-03-20T08:36:48.164435253Z 2026-03-20T08:36:48.164769513Z I0320 08:36:48.164750 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-20T08:36:48.167802192Z I0320 08:36:48.167756 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-20T08:36:48.168193053Z I0320 08:36:48.168125 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-20T08:36:48.168792681Z I0320 08:36:48.168773 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 olm-operator_current.log0000640000000000000000000005177415157203665033057 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-5c9796789-tjm9l2026-03-20T08:39:06.540472778Z time="2026-03-20T08:39:06Z" level=info msg="install strategy successful" csv=packageserver id=cUb8u namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:06.637316964Z time="2026-03-20T08:39:06Z" level=info msg="install strategy successful" csv=packageserver id=bGjXh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:06.735478989Z time="2026-03-20T08:39:06Z" level=info msg="install strategy successful" csv=packageserver id=68Bsb namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:06.834479958Z time="2026-03-20T08:39:06Z" level=info msg="install strategy successful" csv=packageserver id=W3Gbr namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:06.934384823Z time="2026-03-20T08:39:06Z" level=info msg="install strategy successful" csv=packageserver id=yvZxL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:07.035643889Z time="2026-03-20T08:39:07Z" level=info msg="install strategy successful" csv=packageserver id=srgJ+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:07.137395128Z time="2026-03-20T08:39:07Z" level=info msg="install strategy successful" csv=packageserver id=hK6x1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:07.237833309Z time="2026-03-20T08:39:07Z" level=info msg="install strategy successful" csv=packageserver id=jCwZE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:07.338141176Z time="2026-03-20T08:39:07Z" level=info msg="install strategy successful" csv=packageserver id=KB6Jf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:07.438373181Z time="2026-03-20T08:39:07Z" level=info msg="install strategy successful" csv=packageserver id=KYoxH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:07.538652438Z time="2026-03-20T08:39:07Z" level=info msg="install strategy successful" csv=packageserver id=FPGTa namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:07.649688938Z time="2026-03-20T08:39:07Z" level=info msg="install strategy successful" csv=packageserver id=/X22u namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:07.735168673Z time="2026-03-20T08:39:07Z" level=info msg="install strategy successful" csv=packageserver id=Pf4Ez namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:07.835138150Z time="2026-03-20T08:39:07Z" level=info msg="install strategy successful" csv=packageserver id=iNCxE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:07.939723222Z time="2026-03-20T08:39:07Z" level=info msg="install strategy successful" csv=packageserver id=tl3ZH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:08.039464552Z time="2026-03-20T08:39:08Z" level=info msg="install strategy successful" csv=packageserver id=thX11 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:08.140100059Z time="2026-03-20T08:39:08Z" level=info msg="install strategy successful" csv=packageserver id=5QLYm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:08.244089434Z time="2026-03-20T08:39:08Z" level=info msg="install strategy successful" csv=packageserver id=Z+kkL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:08.340224889Z time="2026-03-20T08:39:08Z" level=info msg="install strategy successful" csv=packageserver id=9HpUR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:08.443604876Z time="2026-03-20T08:39:08Z" level=info msg="install strategy successful" csv=packageserver id=ZSkxj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:08.547073526Z time="2026-03-20T08:39:08Z" level=info msg="install strategy successful" csv=packageserver id=vhL3O namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:08.643016645Z time="2026-03-20T08:39:08Z" level=info msg="install strategy successful" csv=packageserver id=oRMKu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:08.770983520Z time="2026-03-20T08:39:08Z" level=info msg="install strategy successful" csv=packageserver id=/c6ze namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:08.857776843Z time="2026-03-20T08:39:08Z" level=info msg="install strategy successful" csv=packageserver id=7HOyo namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:08.955293639Z time="2026-03-20T08:39:08Z" level=info msg="install strategy successful" csv=packageserver id=QeE57 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:09.057941814Z time="2026-03-20T08:39:09Z" level=info msg="install strategy successful" csv=packageserver id=d6lRj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:09.155669476Z time="2026-03-20T08:39:09Z" level=info msg="install strategy successful" csv=packageserver id=VTA8f namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:09.259869867Z time="2026-03-20T08:39:09Z" level=info msg="install strategy successful" csv=packageserver id=2SqHV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:09.356797636Z time="2026-03-20T08:39:09Z" level=info msg="install strategy successful" csv=packageserver id=F8I60 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:09.458873685Z time="2026-03-20T08:39:09Z" level=info msg="install strategy successful" csv=packageserver id=jzPqf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:09.559004977Z time="2026-03-20T08:39:09Z" level=info msg="install strategy successful" csv=packageserver id=Hp5p3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:09.662837277Z time="2026-03-20T08:39:09Z" level=info msg="install strategy successful" csv=packageserver id=RLpjv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:09.758160729Z time="2026-03-20T08:39:09Z" level=info msg="install strategy successful" csv=packageserver id=Lg3Tf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:09.861249097Z time="2026-03-20T08:39:09Z" level=info msg="install strategy successful" csv=packageserver id=WHa7b namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:09.960269427Z time="2026-03-20T08:39:09Z" level=info msg="install strategy successful" csv=packageserver id=fhzSy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:10.075284243Z time="2026-03-20T08:39:10Z" level=info msg="install strategy successful" csv=packageserver id=jdSFt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:10.176469356Z time="2026-03-20T08:39:10Z" level=info msg="install strategy successful" csv=packageserver id=lw9QM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:10.270251583Z time="2026-03-20T08:39:10Z" level=info msg="install strategy successful" csv=packageserver id=YP/qC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:10.369784368Z time="2026-03-20T08:39:10Z" level=info msg="install strategy successful" csv=packageserver id=DUuHU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:10.470830486Z time="2026-03-20T08:39:10Z" level=info msg="install strategy successful" csv=packageserver id=sUwwn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:10.571400031Z time="2026-03-20T08:39:10Z" level=info msg="install strategy successful" csv=packageserver id=tvcT8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:10.671136912Z time="2026-03-20T08:39:10Z" level=info msg="install strategy successful" csv=packageserver id=jFzik namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:10.773418237Z time="2026-03-20T08:39:10Z" level=info msg="install strategy successful" csv=packageserver id=B9Zk5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:10.833593423Z time="2026-03-20T08:39:10Z" level=info msg="install strategy successful" csv=packageserver id=oMeJX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:10.934273901Z time="2026-03-20T08:39:10Z" level=info msg="install strategy successful" csv=packageserver id=5YwO4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:11.037947957Z time="2026-03-20T08:39:11Z" level=info msg="install strategy successful" csv=packageserver id=BolA+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:11.137108861Z time="2026-03-20T08:39:11Z" level=info msg="install strategy successful" csv=packageserver id=aPKGq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:11.240851068Z time="2026-03-20T08:39:11Z" level=info msg="install strategy successful" csv=packageserver id=FhCWO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:11.337253821Z time="2026-03-20T08:39:11Z" level=info msg="install strategy successful" csv=packageserver id=jQ3uV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:11.443498242Z time="2026-03-20T08:39:11Z" level=info msg="install strategy successful" csv=packageserver id=rdheI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:11.542619584Z time="2026-03-20T08:39:11Z" level=info msg="install strategy successful" csv=packageserver id=/xwPt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:11.642118367Z time="2026-03-20T08:39:11Z" level=info msg="install strategy successful" csv=packageserver id=n/xhD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:11.742360083Z time="2026-03-20T08:39:11Z" level=info msg="install strategy successful" csv=packageserver id=DZ9aa namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:11.842258458Z time="2026-03-20T08:39:11Z" level=info msg="install strategy successful" csv=packageserver id=fvyHe namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:11.943791861Z time="2026-03-20T08:39:11Z" level=info msg="install strategy successful" csv=packageserver id=PrftK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:12.054286686Z time="2026-03-20T08:39:12Z" level=info msg="install strategy successful" csv=packageserver id=qkuoL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:12.145368774Z time="2026-03-20T08:39:12Z" level=info msg="install strategy successful" csv=packageserver id=2E8qd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:12.261847103Z time="2026-03-20T08:39:12Z" level=info msg="install strategy successful" csv=packageserver id=84KW7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:12.346251386Z time="2026-03-20T08:39:12Z" level=info msg="install strategy successful" csv=packageserver id=wkrB+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:12.445208124Z time="2026-03-20T08:39:12Z" level=info msg="install strategy successful" csv=packageserver id=PoVHm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:12.544997766Z time="2026-03-20T08:39:12Z" level=info msg="install strategy successful" csv=packageserver id=uBUWk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:12.645410786Z time="2026-03-20T08:39:12Z" level=info msg="install strategy successful" csv=packageserver id=kYvbu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:12.744613661Z time="2026-03-20T08:39:12Z" level=info msg="install strategy successful" csv=packageserver id=ITJlY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:12.834758142Z time="2026-03-20T08:39:12Z" level=info msg="install strategy successful" csv=packageserver id=o+7Ci namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:12.934762450Z time="2026-03-20T08:39:12Z" level=info msg="install strategy successful" csv=packageserver id=dZszZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:13.035703236Z time="2026-03-20T08:39:13Z" level=info msg="install strategy successful" csv=packageserver id=RT2z7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:13.134779128Z time="2026-03-20T08:39:13Z" level=info msg="install strategy successful" csv=packageserver id=6cifQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:13.234349593Z time="2026-03-20T08:39:13Z" level=info msg="install strategy successful" csv=packageserver id=R7pZ0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:13.334210587Z time="2026-03-20T08:39:13Z" level=info msg="install strategy successful" csv=packageserver id=k3Re2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:13.455953780Z time="2026-03-20T08:39:13Z" level=info msg="install strategy successful" csv=packageserver id=5KZkB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:13.543996830Z time="2026-03-20T08:39:13Z" level=info msg="install strategy successful" csv=packageserver id=J6o8l namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:13.645625146Z time="2026-03-20T08:39:13Z" level=info msg="install strategy successful" csv=packageserver id=mU8/9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:13.749833447Z time="2026-03-20T08:39:13Z" level=info msg="install strategy successful" csv=packageserver id=Vt4vv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:13.844019395Z time="2026-03-20T08:39:13Z" level=info msg="install strategy successful" csv=packageserver id=LX9ih namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:13.945170767Z time="2026-03-20T08:39:13Z" level=info msg="install strategy successful" csv=packageserver id=HC4yx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:14.035861634Z time="2026-03-20T08:39:14Z" level=info msg="install strategy successful" csv=packageserver id=zrGH3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:14.135545223Z time="2026-03-20T08:39:14Z" level=info msg="install strategy successful" csv=packageserver id=6zbxn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:14.237945431Z time="2026-03-20T08:39:14Z" level=info msg="install strategy successful" csv=packageserver id=Z5j5C namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:14.334683014Z time="2026-03-20T08:39:14Z" level=info msg="install strategy successful" csv=packageserver id=iE6Xk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:14.446255240Z time="2026-03-20T08:39:14Z" level=info msg="install strategy successful" csv=packageserver id=fcW1n namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:14.545367953Z time="2026-03-20T08:39:14Z" level=info msg="install strategy successful" csv=packageserver id=v2q5G namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:14.644523166Z time="2026-03-20T08:39:14Z" level=info msg="install strategy successful" csv=packageserver id=2LFqv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:14.734740809Z time="2026-03-20T08:39:14Z" level=info msg="install strategy successful" csv=packageserver id=B/XXM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:14.836265412Z time="2026-03-20T08:39:14Z" level=info msg="install strategy successful" csv=packageserver id=GSZsu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:14.936111406Z time="2026-03-20T08:39:14Z" level=info msg="install strategy successful" csv=packageserver id=Onc56 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:15.034229739Z time="2026-03-20T08:39:15Z" level=info msg="install strategy successful" csv=packageserver id=soCfH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:15.137320678Z time="2026-03-20T08:39:15Z" level=info msg="install strategy successful" csv=packageserver id=mLfil namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:15.241130256Z time="2026-03-20T08:39:15Z" level=info msg="install strategy successful" csv=packageserver id=eW25f namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:15.337239961Z time="2026-03-20T08:39:15Z" level=info msg="install strategy successful" csv=packageserver id=28tuS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:15.434941462Z time="2026-03-20T08:39:15Z" level=info msg="install strategy successful" csv=packageserver id=aO0I5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:15.539412531Z time="2026-03-20T08:39:15Z" level=info msg="install strategy successful" csv=packageserver id=lVSMY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:15.636103353Z time="2026-03-20T08:39:15Z" level=info msg="install strategy successful" csv=packageserver id=L5Bwr namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:15.734579786Z time="2026-03-20T08:39:15Z" level=info msg="install strategy successful" csv=packageserver id=vhXiR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:15.834715829Z time="2026-03-20T08:39:15Z" level=info msg="install strategy successful" csv=packageserver id=HmbFY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:15.959212242Z time="2026-03-20T08:39:15Z" level=info msg="install strategy successful" csv=packageserver id=yz47i namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:16.064096283Z time="2026-03-20T08:39:16Z" level=info msg="install strategy successful" csv=packageserver id=F6Bt6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:16.157925981Z time="2026-03-20T08:39:16Z" level=info msg="install strategy successful" csv=packageserver id=R/Fz/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:16.259796314Z time="2026-03-20T08:39:16Z" level=info msg="install strategy successful" csv=packageserver id=76WWY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:16.363110999Z time="2026-03-20T08:39:16Z" level=info msg="install strategy successful" csv=packageserver id=HkluR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-20T08:39:16.463452237Z time="2026-03-20T08:39:16Z" level=info msg="install strategy successful" csv=packageserver id=9yUfR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment catalog-operator_current.log0000640000000000000000000021214015157203665034703 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-68f85b4d6c-fzm282026-03-20T08:39:09.179438620Z time="2026-03-20T08:39:09Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=5VA+Z 2026-03-20T08:39:09.195478598Z time="2026-03-20T08:39:09Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iJsCu 2026-03-20T08:39:09.195478598Z time="2026-03-20T08:39:09Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iJsCu 2026-03-20T08:39:09.375536173Z W0320 08:39:09.374853 1 warnings.go:70] spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-20T08:39:09.375536173Z time="2026-03-20T08:39:09Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=gL5rG 2026-03-20T08:39:09.375536173Z time="2026-03-20T08:39:09Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=gL5rG 2026-03-20T08:39:09.397883205Z time="2026-03-20T08:39:09Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2Qz4w 2026-03-20T08:39:09.397883205Z time="2026-03-20T08:39:09Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2Qz4w 2026-03-20T08:39:09.961449491Z time="2026-03-20T08:39:09Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iJsCu 2026-03-20T08:39:09.961449491Z time="2026-03-20T08:39:09Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-marketplace-srjqw current-pod.namespace=openshift-marketplace id=iJsCu 2026-03-20T08:39:09.965293003Z time="2026-03-20T08:39:09Z" level=info msg="pod spec diff: \u00a0\u00a0v1.PodSpec{\n\u00a0\u00a0\tVolumes: []v1.Volume{\n\u00a0\u00a0\t\t{Name: \"utilities\", VolumeSource: {EmptyDir: &{}}},\n\u00a0\u00a0\t\t{Name: \"catalog-content\", VolumeSource: {EmptyDir: &{}}},\n-\u00a0\t\t{\n-\u00a0\t\t\tName: \"kube-api-access-xgmtk\",\n-\u00a0\t\t\tVolumeSource: v1.VolumeSource{\n-\u00a0\t\t\t\tProjected: s\"&ProjectedVolumeSource{Sources:[]VolumeProjection{VolumeProjecti\"...,\n-\u00a0\t\t\t},\n-\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tInitContainers: []v1.Container{\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 9 identical fields\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"utilities\", MountPath: \"/utilities\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-xgmtk\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: nil,\n\u00a0\u00a0\t\t\tReadinessProbe: nil,\n\u00a0\u00a0\t\t\tStartupProbe: nil,\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n-\u00a0\t\t\tImagePullPolicy: \"IfNotPresent\",\n+\u00a0\t\t\tImagePullPolicy: \"\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000230000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: nil,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 9 identical fields\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"utilities\", MountPath: \"/utilities\"},\n\u00a0\u00a0\t\t\t\t{Name: \"catalog-content\", MountPath: \"/extracted-catalog\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-xgmtk\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: nil,\n\u00a0\u00a0\t\t\tReadinessProbe: nil,\n\u00a0\u00a0\t\t\tStartupProbe: nil,\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n\u00a0\u00a0\t\t\tImagePullPolicy: \"Always\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000230000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: nil,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tContainers: []v1.Container{\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\tArgs: {\"serve\", \"/extracted-catalog/catalog\", \"--cache-dir=/extracted-catalog/cache\"},\n\u00a0\u00a0\t\t\tWorkingDir: \"\",\n\u00a0\u00a0\t\t\tPorts: []v1.ContainerPort{\n\u00a0\u00a0\t\t\t\t{\n\u00a0\u00a0\t\t\t\t\tName: \"grpc\",\n\u00a0\u00a0\t\t\t\t\tHostPort: 0,\n\u00a0\u00a0\t\t\t\t\tContainerPort: 50051,\n-\u00a0\t\t\t\t\tProtocol: \"TCP\",\n+\u00a0\t\t\t\t\tProtocol: \"\",\n\u00a0\u00a0\t\t\t\t\tHostIP: \"\",\n\u00a0\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tEnvFrom: nil,\n\u00a0\u00a0\t\t\tEnv: {{Name: \"GOMEMLIMIT\", Value: \"20MiB\"}},\n\u00a0\u00a0\t\t\tResources: v1.ResourceRequirements{\n-\u00a0\t\t\t\tLimits: nil,\n+\u00a0\t\t\t\tLimits: v1.ResourceList{},\n\u00a0\u00a0\t\t\t\tRequests: {s\"cpu\": {i: {...}, s: \"10m\", Format: \"DecimalSI\"}, s\"memory\": {i: {...}, s: \"20Mi\", Format: \"BinarySI\"}},\n\u00a0\u00a0\t\t\t\tClaims: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"catalog-content\", MountPath: \"/extracted-catalog\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-xgmtk\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\tProbeHandler: {Exec: &{Command: {\"grpc_health_probe\", \"-addr=:50051\"}}},\n\u00a0\u00a0\t\t\t\tInitialDelaySeconds: 10,\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n-\u00a0\t\t\t\tPeriodSeconds: 10,\n+\u00a0\t\t\t\tPeriodSeconds: 0,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n-\u00a0\t\t\t\tFailureThreshold: 3,\n+\u00a0\t\t\t\tFailureThreshold: 0,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tReadinessProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\tProbeHandler: {Exec: &{Command: {\"grpc_health_probe\", \"-addr=:50051\"}}},\n\u00a0\u00a0\t\t\t\tInitialDelaySeconds: 5,\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n-\u00a0\t\t\t\tPeriodSeconds: 10,\n+\u00a0\t\t\t\tPeriodSeconds: 0,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n-\u00a0\t\t\t\tFailureThreshold: 3,\n+\u00a0\t\t\t\tFailureThreshold: 0,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStartupProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n\u00a0\u00a0\t\t\t\tPeriodSeconds: 10,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n\u00a0\u00a0\t\t\t\tFailureThreshold: 10,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n\u00a0\u00a0\t\t\tImagePullPolicy: \"Always\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000230000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: &false,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tEphemeralContainers: nil,\n-\u00a0\tRestartPolicy: \"Always\",\n+\u00a0\tRestartPolicy: \"\",\n-\u00a0\tTerminationGracePeriodSeconds: &30,\n+\u00a0\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\tActiveDeadlineSeconds: nil,\n-\u00a0\tDNSPolicy: \"ClusterFirst\",\n+\u00a0\tDNSPolicy: \"\",\n\u00a0\u00a0\tNodeSelector: {\"kubernetes.io/os\": \"linux\", \"node-role.kubernetes.io/master\": \"\"},\n\u00a0\u00a0\tServiceAccountName: \"redhat-marketplace\",\n-\u00a0\tDeprecatedServiceAccount: \"redhat-marketplace\",\n+\u00a0\tDeprecatedServiceAccount: \"\",\n\u00a0\u00a0\tAutomountServiceAccountToken: nil,\n-\u00a0\tNodeName: \"master-0\",\n+\u00a0\tNodeName: \"\",\n\u00a0\u00a0\tHostNetwork: false,\n\u00a0\u00a0\tHostPID: false,\n\u00a0\u00a0\tHostIPC: false,\n\u00a0\u00a0\tShareProcessNamespace: nil,\n\u00a0\u00a0\tSecurityContext: &v1.PodSecurityContext{\n-\u00a0\t\tSELinuxOptions: s\"&SELinuxOptions{User:,Role:,Type:,Level:s0:c15,c10,}\",\n+\u00a0\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\tWindowsOptions: nil,\n\u00a0\u00a0\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t... // 2 identical fields\n\u00a0\u00a0\t\tSupplementalGroups: nil,\n\u00a0\u00a0\t\tSupplementalGroupsPolicy: nil,\n-\u00a0\t\tFSGroup: &1000230000,\n+\u00a0\t\tFSGroup: nil,\n\u00a0\u00a0\t\tSysctls: nil,\n\u00a0\u00a0\t\tFSGroupChangePolicy: nil,\n\u00a0\u00a0\t\t... // 2 identical fields\n\u00a0\u00a0\t},\n-\u00a0\tImagePullSecrets: nil,\n+\u00a0\tImagePullSecrets: []v1.LocalObjectReference{{Name: \"redhat-marketplace-dockercfg-frnfd\"}},\n\u00a0\u00a0\tHostname: \"\",\n\u00a0\u00a0\tSubdomain: \"\",\n\u00a0\u00a0\tAffinity: nil,\n-\u00a0\tSchedulerName: \"default-scheduler\",\n+\u00a0\tSchedulerName: \"\",\n\u00a0\u00a0\tTolerations: []v1.Toleration{\n\u00a0\u00a0\t\t{Key: \"node-role.kubernetes.io/master\", Operator: \"Exists\", Effect: \"NoSchedule\"},\n\u00a0\u00a0\t\t{Key: \"node.kubernetes.io/unreachable\", Operator: \"Exists\", Effect: \"NoExecute\", TolerationSeconds: &120},\n\u00a0\u00a0\t\t{Key: \"node.kubernetes.io/not-ready\", Operator: \"Exists\", Effect: \"NoExecute\", TolerationSeconds: &120},\n-\u00a0\t\t{\n-\u00a0\t\t\tKey: \"node.kubernetes.io/memory-pressure\",\n-\u00a0\t\t\tOperator: \"Exists\",\n-\u00a0\t\t\tEffect: \"NoSchedule\",\n-\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tHostAliases: nil,\n\u00a0\u00a0\tPriorityClassName: \"system-cluster-critical\",\n-\u00a0\tPriority: &2000000000,\n+\u00a0\tPriority: nil,\n\u00a0\u00a0\tDNSConfig: nil,\n\u00a0\u00a0\tReadinessGates: nil,\n\u00a0\u00a0\tRuntimeClassName: nil,\n-\u00a0\tEnableServiceLinks: &true,\n+\u00a0\tEnableServiceLinks: nil,\n-\u00a0\tPreemptionPolicy: &\"PreemptLowerPriority\",\n+\u00a0\tPreemptionPolicy: nil,\n\u00a0\u00a0\tOverhead: nil,\n\u00a0\u00a0\tTopologySpreadConstraints: nil,\n\u00a0\u00a0\t... // 5 identical fields\n\u00a0\u00a0}\n" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-marketplace-srjqw current-pod.namespace=openshift-marketplace id=iJsCu 2026-03-20T08:39:09.965371276Z time="2026-03-20T08:39:09Z" level=info msg="of 1 pods matching label selector, 0 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-marketplace-srjqw current-pod.namespace=openshift-marketplace id=iJsCu 2026-03-20T08:39:09.965371276Z time="2026-03-20T08:39:09Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=false id=iJsCu 2026-03-20T08:39:09.965371276Z time="2026-03-20T08:39:09Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iJsCu 2026-03-20T08:39:10.179034471Z time="2026-03-20T08:39:10Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2Qz4w 2026-03-20T08:39:10.179084282Z time="2026-03-20T08:39:10Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-operators-mgcb9 current-pod.namespace=openshift-marketplace id=2Qz4w 2026-03-20T08:39:10.183258894Z time="2026-03-20T08:39:10Z" level=info msg="pod spec diff: \u00a0\u00a0v1.PodSpec{\n\u00a0\u00a0\tVolumes: []v1.Volume{\n\u00a0\u00a0\t\t{Name: \"utilities\", VolumeSource: {EmptyDir: &{}}},\n\u00a0\u00a0\t\t{Name: \"catalog-content\", VolumeSource: {EmptyDir: &{}}},\n-\u00a0\t\t{\n-\u00a0\t\t\tName: \"kube-api-access-8s9bz\",\n-\u00a0\t\t\tVolumeSource: v1.VolumeSource{\n-\u00a0\t\t\t\tProjected: s\"&ProjectedVolumeSource{Sources:[]VolumeProjection{VolumeProjecti\"...,\n-\u00a0\t\t\t},\n-\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tInitContainers: []v1.Container{\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 9 identical fields\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"utilities\", MountPath: \"/utilities\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-8s9bz\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: nil,\n\u00a0\u00a0\t\t\tReadinessProbe: nil,\n\u00a0\u00a0\t\t\tStartupProbe: nil,\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n-\u00a0\t\t\tImagePullPolicy: \"IfNotPresent\",\n+\u00a0\t\t\tImagePullPolicy: \"\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000230000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: nil,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 9 identical fields\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"utilities\", MountPath: \"/utilities\"},\n\u00a0\u00a0\t\t\t\t{Name: \"catalog-content\", MountPath: \"/extracted-catalog\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-8s9bz\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: nil,\n\u00a0\u00a0\t\t\tReadinessProbe: nil,\n\u00a0\u00a0\t\t\tStartupProbe: nil,\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n\u00a0\u00a0\t\t\tImagePullPolicy: \"Always\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000230000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: nil,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tContainers: []v1.Container{\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\tArgs: {\"serve\", \"/extracted-catalog/catalog\", \"--cache-dir=/extracted-catalog/cache\"},\n\u00a0\u00a0\t\t\tWorkingDir: \"\",\n\u00a0\u00a0\t\t\tPorts: []v1.ContainerPort{\n\u00a0\u00a0\t\t\t\t{\n\u00a0\u00a0\t\t\t\t\tName: \"grpc\",\n\u00a0\u00a0\t\t\t\t\tHostPort: 0,\n\u00a0\u00a0\t\t\t\t\tContainerPort: 50051,\n-\u00a0\t\t\t\t\tProtocol: \"TCP\",\n+\u00a0\t\t\t\t\tProtocol: \"\",\n\u00a0\u00a0\t\t\t\t\tHostIP: \"\",\n\u00a0\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tEnvFrom: nil,\n\u00a0\u00a0\t\t\tEnv: {{Name: \"GOMEMLIMIT\", Value: \"30MiB\"}},\n\u00a0\u00a0\t\t\tResources: v1.ResourceRequirements{\n-\u00a0\t\t\t\tLimits: nil,\n+\u00a0\t\t\t\tLimits: v1.ResourceList{},\n\u00a0\u00a0\t\t\t\tRequests: {s\"cpu\": {i: {...}, s: \"10m\", Format: \"DecimalSI\"}, s\"memory\": {i: {...}, s: \"30Mi\", Format: \"BinarySI\"}},\n\u00a0\u00a0\t\t\t\tClaims: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"catalog-content\", MountPath: \"/extracted-catalog\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-8s9bz\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\tProbeHandler: {Exec: &{Command: {\"grpc_health_probe\", \"-addr=:50051\"}}},\n\u00a0\u00a0\t\t\t\tInitialDelaySeconds: 10,\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n-\u00a0\t\t\t\tPeriodSeconds: 10,\n+\u00a0\t\t\t\tPeriodSeconds: 0,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n-\u00a0\t\t\t\tFailureThreshold: 3,\n+\u00a0\t\t\t\tFailureThreshold: 0,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tReadinessProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\tProbeHandler: {Exec: &{Command: {\"grpc_health_probe\", \"-addr=:50051\"}}},\n\u00a0\u00a0\t\t\t\tInitialDelaySeconds: 5,\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n-\u00a0\t\t\t\tPeriodSeconds: 10,\n+\u00a0\t\t\t\tPeriodSeconds: 0,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n-\u00a0\t\t\t\tFailureThreshold: 3,\n+\u00a0\t\t\t\tFailureThreshold: 0,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStartupProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n\u00a0\u00a0\t\t\t\tPeriodSeconds: 10,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n\u00a0\u00a0\t\t\t\tFailureThreshold: 10,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n\u00a0\u00a0\t\t\tImagePullPolicy: \"Always\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000230000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: &false,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tEphemeralContainers: nil,\n-\u00a0\tRestartPolicy: \"Always\",\n+\u00a0\tRestartPolicy: \"\",\n-\u00a0\tTerminationGracePeriodSeconds: &30,\n+\u00a0\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\tActiveDeadlineSeconds: nil,\n-\u00a0\tDNSPolicy: \"ClusterFirst\",\n+\u00a0\tDNSPolicy: \"\",\n\u00a0\u00a0\tNodeSelector: {\"kubernetes.io/os\": \"linux\", \"node-role.kubernetes.io/master\": \"\"},\n\u00a0\u00a0\tServiceAccountName: \"redhat-operators\",\n-\u00a0\tDeprecatedServiceAccount: \"redhat-operators\",\n+\u00a0\tDeprecatedServiceAccount: \"\",\n\u00a0\u00a0\tAutomountServiceAccountToken: nil,\n-\u00a0\tNodeName: \"master-0\",\n+\u00a0\tNodeName: \"\",\n\u00a0\u00a0\tHostNetwork: false,\n\u00a0\u00a0\tHostPID: false,\n\u00a0\u00a0\tHostIPC: false,\n\u00a0\u00a0\tShareProcessNamespace: nil,\n\u00a0\u00a0\tSecurityContext: &v1.PodSecurityContext{\n-\u00a0\t\tSELinuxOptions: s\"&SELinuxOptions{User:,Role:,Type:,Level:s0:c15,c10,}\",\n+\u00a0\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\tWindowsOptions: nil,\n\u00a0\u00a0\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t... // 2 identical fields\n\u00a0\u00a0\t\tSupplementalGroups: nil,\n\u00a0\u00a0\t\tSupplementalGroupsPolicy: nil,\n-\u00a0\t\tFSGroup: &1000230000,\n+\u00a0\t\tFSGroup: nil,\n\u00a0\u00a0\t\tSysctls: nil,\n\u00a0\u00a0\t\tFSGroupChangePolicy: nil,\n\u00a0\u00a0\t\t... // 2 identical fields\n\u00a0\u00a0\t},\n-\u00a0\tImagePullSecrets: nil,\n+\u00a0\tImagePullSecrets: []v1.LocalObjectReference{{Name: \"redhat-operators-dockercfg-bksjt\"}},\n\u00a0\u00a0\tHostname: \"\",\n\u00a0\u00a0\tSubdomain: \"\",\n\u00a0\u00a0\tAffinity: nil,\n-\u00a0\tSchedulerName: \"default-scheduler\",\n+\u00a0\tSchedulerName: \"\",\n\u00a0\u00a0\tTolerations: []v1.Toleration{\n\u00a0\u00a0\t\t{Key: \"node-role.kubernetes.io/master\", Operator: \"Exists\", Effect: \"NoSchedule\"},\n\u00a0\u00a0\t\t{Key: \"node.kubernetes.io/unreachable\", Operator: \"Exists\", Effect: \"NoExecute\", TolerationSeconds: &120},\n\u00a0\u00a0\t\t{Key: \"node.kubernetes.io/not-ready\", Operator: \"Exists\", Effect: \"NoExecute\", TolerationSeconds: &120},\n-\u00a0\t\t{\n-\u00a0\t\t\tKey: \"node.kubernetes.io/memory-pressure\",\n-\u00a0\t\t\tOperator: \"Exists\",\n-\u00a0\t\t\tEffect: \"NoSchedule\",\n-\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tHostAliases: nil,\n\u00a0\u00a0\tPriorityClassName: \"system-cluster-critical\",\n-\u00a0\tPriority: &2000000000,\n+\u00a0\tPriority: nil,\n\u00a0\u00a0\tDNSConfig: nil,\n\u00a0\u00a0\tReadinessGates: nil,\n\u00a0\u00a0\tRuntimeClassName: nil,\n-\u00a0\tEnableServiceLinks: &true,\n+\u00a0\tEnableServiceLinks: nil,\n-\u00a0\tPreemptionPolicy: &\"PreemptLowerPriority\",\n+\u00a0\tPreemptionPolicy: nil,\n\u00a0\u00a0\tOverhead: nil,\n\u00a0\u00a0\tTopologySpreadConstraints: nil,\n\u00a0\u00a0\t... // 5 identical fields\n\u00a0\u00a0}\n" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-operators-mgcb9 current-pod.namespace=openshift-marketplace id=2Qz4w 2026-03-20T08:39:10.183333286Z time="2026-03-20T08:39:10Z" level=info msg="of 1 pods matching label selector, 0 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-operators-mgcb9 current-pod.namespace=openshift-marketplace id=2Qz4w 2026-03-20T08:39:10.183333286Z time="2026-03-20T08:39:10Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=false id=2Qz4w 2026-03-20T08:39:10.183333286Z time="2026-03-20T08:39:10Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2Qz4w 2026-03-20T08:39:11.158892726Z time="2026-03-20T08:39:11Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iJsCu 2026-03-20T08:39:11.159047071Z time="2026-03-20T08:39:11Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-marketplace-srjqw current-pod.namespace=openshift-marketplace id=iJsCu 2026-03-20T08:39:11.162501122Z time="2026-03-20T08:39:11Z" level=info msg="pod spec diff: \u00a0\u00a0v1.PodSpec{\n\u00a0\u00a0\tVolumes: []v1.Volume{\n\u00a0\u00a0\t\t{Name: \"utilities\", VolumeSource: {EmptyDir: &{}}},\n\u00a0\u00a0\t\t{Name: \"catalog-content\", VolumeSource: {EmptyDir: &{}}},\n-\u00a0\t\t{\n-\u00a0\t\t\tName: \"kube-api-access-xgmtk\",\n-\u00a0\t\t\tVolumeSource: v1.VolumeSource{\n-\u00a0\t\t\t\tProjected: s\"&ProjectedVolumeSource{Sources:[]VolumeProjection{VolumeProjecti\"...,\n-\u00a0\t\t\t},\n-\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tInitContainers: []v1.Container{\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 9 identical fields\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"utilities\", MountPath: \"/utilities\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-xgmtk\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: nil,\n\u00a0\u00a0\t\t\tReadinessProbe: nil,\n\u00a0\u00a0\t\t\tStartupProbe: nil,\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n-\u00a0\t\t\tImagePullPolicy: \"IfNotPresent\",\n+\u00a0\t\t\tImagePullPolicy: \"\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000230000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: nil,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 9 identical fields\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"utilities\", MountPath: \"/utilities\"},\n\u00a0\u00a0\t\t\t\t{Name: \"catalog-content\", MountPath: \"/extracted-catalog\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-xgmtk\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: nil,\n\u00a0\u00a0\t\t\tReadinessProbe: nil,\n\u00a0\u00a0\t\t\tStartupProbe: nil,\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n\u00a0\u00a0\t\t\tImagePullPolicy: \"Always\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000230000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: nil,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tContainers: []v1.Container{\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\tArgs: {\"serve\", \"/extracted-catalog/catalog\", \"--cache-dir=/extracted-catalog/cache\"},\n\u00a0\u00a0\t\t\tWorkingDir: \"\",\n\u00a0\u00a0\t\t\tPorts: []v1.ContainerPort{\n\u00a0\u00a0\t\t\t\t{\n\u00a0\u00a0\t\t\t\t\tName: \"grpc\",\n\u00a0\u00a0\t\t\t\t\tHostPort: 0,\n\u00a0\u00a0\t\t\t\t\tContainerPort: 50051,\n-\u00a0\t\t\t\t\tProtocol: \"TCP\",\n+\u00a0\t\t\t\t\tProtocol: \"\",\n\u00a0\u00a0\t\t\t\t\tHostIP: \"\",\n\u00a0\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tEnvFrom: nil,\n\u00a0\u00a0\t\t\tEnv: {{Name: \"GOMEMLIMIT\", Value: \"20MiB\"}},\n\u00a0\u00a0\t\t\tResources: v1.ResourceRequirements{\n-\u00a0\t\t\t\tLimits: nil,\n+\u00a0\t\t\t\tLimits: v1.ResourceList{},\n\u00a0\u00a0\t\t\t\tRequests: {s\"cpu\": {i: {...}, s: \"10m\", Format: \"DecimalSI\"}, s\"memory\": {i: {...}, s: \"20Mi\", Format: \"BinarySI\"}},\n\u00a0\u00a0\t\t\t\tClaims: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"catalog-content\", MountPath: \"/extracted-catalog\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-xgmtk\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\tProbeHandler: {Exec: &{Command: {\"grpc_health_probe\", \"-addr=:50051\"}}},\n\u00a0\u00a0\t\t\t\tInitialDelaySeconds: 10,\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n-\u00a0\t\t\t\tPeriodSeconds: 10,\n+\u00a0\t\t\t\tPeriodSeconds: 0,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n-\u00a0\t\t\t\tFailureThreshold: 3,\n+\u00a0\t\t\t\tFailureThreshold: 0,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tReadinessProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\tProbeHandler: {Exec: &{Command: {\"grpc_health_probe\", \"-addr=:50051\"}}},\n\u00a0\u00a0\t\t\t\tInitialDelaySeconds: 5,\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n-\u00a0\t\t\t\tPeriodSeconds: 10,\n+\u00a0\t\t\t\tPeriodSeconds: 0,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n-\u00a0\t\t\t\tFailureThreshold: 3,\n+\u00a0\t\t\t\tFailureThreshold: 0,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStartupProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n\u00a0\u00a0\t\t\t\tPeriodSeconds: 10,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n\u00a0\u00a0\t\t\t\tFailureThreshold: 10,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n\u00a0\u00a0\t\t\tImagePullPolicy: \"Always\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000230000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: &false,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tEphemeralContainers: nil,\n-\u00a0\tRestartPolicy: \"Always\",\n+\u00a0\tRestartPolicy: \"\",\n-\u00a0\tTerminationGracePeriodSeconds: &30,\n+\u00a0\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\tActiveDeadlineSeconds: nil,\n-\u00a0\tDNSPolicy: \"ClusterFirst\",\n+\u00a0\tDNSPolicy: \"\",\n\u00a0\u00a0\tNodeSelector: {\"kubernetes.io/os\": \"linux\", \"node-role.kubernetes.io/master\": \"\"},\n\u00a0\u00a0\tServiceAccountName: \"redhat-marketplace\",\n-\u00a0\tDeprecatedServiceAccount: \"redhat-marketplace\",\n+\u00a0\tDeprecatedServiceAccount: \"\",\n\u00a0\u00a0\tAutomountServiceAccountToken: nil,\n-\u00a0\tNodeName: \"master-0\",\n+\u00a0\tNodeName: \"\",\n\u00a0\u00a0\tHostNetwork: false,\n\u00a0\u00a0\tHostPID: false,\n\u00a0\u00a0\tHostIPC: false,\n\u00a0\u00a0\tShareProcessNamespace: nil,\n\u00a0\u00a0\tSecurityContext: &v1.PodSecurityContext{\n-\u00a0\t\tSELinuxOptions: s\"&SELinuxOptions{User:,Role:,Type:,Level:s0:c15,c10,}\",\n+\u00a0\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\tWindowsOptions: nil,\n\u00a0\u00a0\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t... // 2 identical fields\n\u00a0\u00a0\t\tSupplementalGroups: nil,\n\u00a0\u00a0\t\tSupplementalGroupsPolicy: nil,\n-\u00a0\t\tFSGroup: &1000230000,\n+\u00a0\t\tFSGroup: nil,\n\u00a0\u00a0\t\tSysctls: nil,\n\u00a0\u00a0\t\tFSGroupChangePolicy: nil,\n\u00a0\u00a0\t\t... // 2 identical fields\n\u00a0\u00a0\t},\n-\u00a0\tImagePullSecrets: nil,\n+\u00a0\tImagePullSecrets: []v1.LocalObjectReference{{Name: \"redhat-marketplace-dockercfg-frnfd\"}},\n\u00a0\u00a0\tHostname: \"\",\n\u00a0\u00a0\tSubdomain: \"\",\n\u00a0\u00a0\tAffinity: nil,\n-\u00a0\tSchedulerName: \"default-scheduler\",\n+\u00a0\tSchedulerName: \"\",\n\u00a0\u00a0\tTolerations: []v1.Toleration{\n\u00a0\u00a0\t\t{Key: \"node-role.kubernetes.io/master\", Operator: \"Exists\", Effect: \"NoSchedule\"},\n\u00a0\u00a0\t\t{Key: \"node.kubernetes.io/unreachable\", Operator: \"Exists\", Effect: \"NoExecute\", TolerationSeconds: &120},\n\u00a0\u00a0\t\t{Key: \"node.kubernetes.io/not-ready\", Operator: \"Exists\", Effect: \"NoExecute\", TolerationSeconds: &120},\n-\u00a0\t\t{\n-\u00a0\t\t\tKey: \"node.kubernetes.io/memory-pressure\",\n-\u00a0\t\t\tOperator: \"Exists\",\n-\u00a0\t\t\tEffect: \"NoSchedule\",\n-\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tHostAliases: nil,\n\u00a0\u00a0\tPriorityClassName: \"system-cluster-critical\",\n-\u00a0\tPriority: &2000000000,\n+\u00a0\tPriority: nil,\n\u00a0\u00a0\tDNSConfig: nil,\n\u00a0\u00a0\tReadinessGates: nil,\n\u00a0\u00a0\tRuntimeClassName: nil,\n-\u00a0\tEnableServiceLinks: &true,\n+\u00a0\tEnableServiceLinks: nil,\n-\u00a0\tPreemptionPolicy: &\"PreemptLowerPriority\",\n+\u00a0\tPreemptionPolicy: nil,\n\u00a0\u00a0\tOverhead: nil,\n\u00a0\u00a0\tTopologySpreadConstraints: nil,\n\u00a0\u00a0\t... // 5 identical fields\n\u00a0\u00a0}\n" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-marketplace-srjqw current-pod.namespace=openshift-marketplace id=iJsCu 2026-03-20T08:39:11.162556143Z time="2026-03-20T08:39:11Z" level=info msg="of 1 pods matching label selector, 0 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-marketplace-srjqw current-pod.namespace=openshift-marketplace id=iJsCu 2026-03-20T08:39:11.162556143Z time="2026-03-20T08:39:11Z" level=info msg="registry pods invalid, need to overwrite" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iJsCu 2026-03-20T08:39:11.162666026Z time="2026-03-20T08:39:11Z" level=info msg="deleting current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iJsCu pod.name=redhat-marketplace-srjqw pod.namespace=openshift-marketplace 2026-03-20T08:39:11.358413689Z time="2026-03-20T08:39:11Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2Qz4w 2026-03-20T08:39:11.358566763Z time="2026-03-20T08:39:11Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-operators-mgcb9 current-pod.namespace=openshift-marketplace id=2Qz4w 2026-03-20T08:39:11.360925412Z time="2026-03-20T08:39:11Z" level=info msg="pod spec diff: \u00a0\u00a0v1.PodSpec{\n\u00a0\u00a0\tVolumes: []v1.Volume{\n\u00a0\u00a0\t\t{Name: \"utilities\", VolumeSource: {EmptyDir: &{}}},\n\u00a0\u00a0\t\t{Name: \"catalog-content\", VolumeSource: {EmptyDir: &{}}},\n-\u00a0\t\t{\n-\u00a0\t\t\tName: \"kube-api-access-8s9bz\",\n-\u00a0\t\t\tVolumeSource: v1.VolumeSource{\n-\u00a0\t\t\t\tProjected: s\"&ProjectedVolumeSource{Sources:[]VolumeProjection{VolumeProjecti\"...,\n-\u00a0\t\t\t},\n-\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tInitContainers: []v1.Container{\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 9 identical fields\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"utilities\", MountPath: \"/utilities\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-8s9bz\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: nil,\n\u00a0\u00a0\t\t\tReadinessProbe: nil,\n\u00a0\u00a0\t\t\tStartupProbe: nil,\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n-\u00a0\t\t\tImagePullPolicy: \"IfNotPresent\",\n+\u00a0\t\t\tImagePullPolicy: \"\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000230000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: nil,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 9 identical fields\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"utilities\", MountPath: \"/utilities\"},\n\u00a0\u00a0\t\t\t\t{Name: \"catalog-content\", MountPath: \"/extracted-catalog\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-8s9bz\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: nil,\n\u00a0\u00a0\t\t\tReadinessProbe: nil,\n\u00a0\u00a0\t\t\tStartupProbe: nil,\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n\u00a0\u00a0\t\t\tImagePullPolicy: \"Always\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000230000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: nil,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tContainers: []v1.Container{\n\u00a0\u00a0\t\t{\n\u00a0\u00a0\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\tArgs: {\"serve\", \"/extracted-catalog/catalog\", \"--cache-dir=/extracted-catalog/cache\"},\n\u00a0\u00a0\t\t\tWorkingDir: \"\",\n\u00a0\u00a0\t\t\tPorts: []v1.ContainerPort{\n\u00a0\u00a0\t\t\t\t{\n\u00a0\u00a0\t\t\t\t\tName: \"grpc\",\n\u00a0\u00a0\t\t\t\t\tHostPort: 0,\n\u00a0\u00a0\t\t\t\t\tContainerPort: 50051,\n-\u00a0\t\t\t\t\tProtocol: \"TCP\",\n+\u00a0\t\t\t\t\tProtocol: \"\",\n\u00a0\u00a0\t\t\t\t\tHostIP: \"\",\n\u00a0\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tEnvFrom: nil,\n\u00a0\u00a0\t\t\tEnv: {{Name: \"GOMEMLIMIT\", Value: \"30MiB\"}},\n\u00a0\u00a0\t\t\tResources: v1.ResourceRequirements{\n-\u00a0\t\t\t\tLimits: nil,\n+\u00a0\t\t\t\tLimits: v1.ResourceList{},\n\u00a0\u00a0\t\t\t\tRequests: {s\"cpu\": {i: {...}, s: \"10m\", Format: \"DecimalSI\"}, s\"memory\": {i: {...}, s: \"30Mi\", Format: \"BinarySI\"}},\n\u00a0\u00a0\t\t\t\tClaims: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tResizePolicy: nil,\n\u00a0\u00a0\t\t\tRestartPolicy: nil,\n\u00a0\u00a0\t\t\tVolumeMounts: []v1.VolumeMount{\n\u00a0\u00a0\t\t\t\t{Name: \"catalog-content\", MountPath: \"/extracted-catalog\"},\n-\u00a0\t\t\t\t{\n-\u00a0\t\t\t\t\tName: \"kube-api-access-8s9bz\",\n-\u00a0\t\t\t\t\tReadOnly: true,\n-\u00a0\t\t\t\t\tMountPath: \"/var/run/secrets/kubernetes.io/serviceaccount\",\n-\u00a0\t\t\t\t},\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tVolumeDevices: nil,\n\u00a0\u00a0\t\t\tLivenessProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\tProbeHandler: {Exec: &{Command: {\"grpc_health_probe\", \"-addr=:50051\"}}},\n\u00a0\u00a0\t\t\t\tInitialDelaySeconds: 10,\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n-\u00a0\t\t\t\tPeriodSeconds: 10,\n+\u00a0\t\t\t\tPeriodSeconds: 0,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n-\u00a0\t\t\t\tFailureThreshold: 3,\n+\u00a0\t\t\t\tFailureThreshold: 0,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tReadinessProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\tProbeHandler: {Exec: &{Command: {\"grpc_health_probe\", \"-addr=:50051\"}}},\n\u00a0\u00a0\t\t\t\tInitialDelaySeconds: 5,\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n-\u00a0\t\t\t\tPeriodSeconds: 10,\n+\u00a0\t\t\t\tPeriodSeconds: 0,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n-\u00a0\t\t\t\tFailureThreshold: 3,\n+\u00a0\t\t\t\tFailureThreshold: 0,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStartupProbe: &v1.Probe{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tTimeoutSeconds: 5,\n\u00a0\u00a0\t\t\t\tPeriodSeconds: 10,\n-\u00a0\t\t\t\tSuccessThreshold: 1,\n+\u00a0\t\t\t\tSuccessThreshold: 0,\n\u00a0\u00a0\t\t\t\tFailureThreshold: 10,\n\u00a0\u00a0\t\t\t\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tLifecycle: nil,\n-\u00a0\t\t\tTerminationMessagePath: \"/dev/termination-log\",\n+\u00a0\t\t\tTerminationMessagePath: \"\",\n\u00a0\u00a0\t\t\tTerminationMessagePolicy: \"FallbackToLogsOnError\",\n\u00a0\u00a0\t\t\tImagePullPolicy: \"Always\",\n\u00a0\u00a0\t\t\tSecurityContext: &v1.SecurityContext{\n\u00a0\u00a0\t\t\t\t... // 2 identical fields\n\u00a0\u00a0\t\t\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\t\t\tWindowsOptions: nil,\n-\u00a0\t\t\t\tRunAsUser: &1000230000,\n+\u00a0\t\t\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t\t\tRunAsGroup: nil,\n-\u00a0\t\t\t\tRunAsNonRoot: &true,\n+\u00a0\t\t\t\tRunAsNonRoot: nil,\n\u00a0\u00a0\t\t\t\tReadOnlyRootFilesystem: &false,\n\u00a0\u00a0\t\t\t\tAllowPrivilegeEscalation: &false,\n\u00a0\u00a0\t\t\t\t... // 3 identical fields\n\u00a0\u00a0\t\t\t},\n\u00a0\u00a0\t\t\tStdin: false,\n\u00a0\u00a0\t\t\tStdinOnce: false,\n\u00a0\u00a0\t\t\tTTY: false,\n\u00a0\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tEphemeralContainers: nil,\n-\u00a0\tRestartPolicy: \"Always\",\n+\u00a0\tRestartPolicy: \"\",\n-\u00a0\tTerminationGracePeriodSeconds: &30,\n+\u00a0\tTerminationGracePeriodSeconds: nil,\n\u00a0\u00a0\tActiveDeadlineSeconds: nil,\n-\u00a0\tDNSPolicy: \"ClusterFirst\",\n+\u00a0\tDNSPolicy: \"\",\n\u00a0\u00a0\tNodeSelector: {\"kubernetes.io/os\": \"linux\", \"node-role.kubernetes.io/master\": \"\"},\n\u00a0\u00a0\tServiceAccountName: \"redhat-operators\",\n-\u00a0\tDeprecatedServiceAccount: \"redhat-operators\",\n+\u00a0\tDeprecatedServiceAccount: \"\",\n\u00a0\u00a0\tAutomountServiceAccountToken: nil,\n-\u00a0\tNodeName: \"master-0\",\n+\u00a0\tNodeName: \"\",\n\u00a0\u00a0\tHostNetwork: false,\n\u00a0\u00a0\tHostPID: false,\n\u00a0\u00a0\tHostIPC: false,\n\u00a0\u00a0\tShareProcessNamespace: nil,\n\u00a0\u00a0\tSecurityContext: &v1.PodSecurityContext{\n-\u00a0\t\tSELinuxOptions: s\"&SELinuxOptions{User:,Role:,Type:,Level:s0:c15,c10,}\",\n+\u00a0\t\tSELinuxOptions: nil,\n\u00a0\u00a0\t\tWindowsOptions: nil,\n\u00a0\u00a0\t\tRunAsUser: nil,\n\u00a0\u00a0\t\t... // 2 identical fields\n\u00a0\u00a0\t\tSupplementalGroups: nil,\n\u00a0\u00a0\t\tSupplementalGroupsPolicy: nil,\n-\u00a0\t\tFSGroup: &1000230000,\n+\u00a0\t\tFSGroup: nil,\n\u00a0\u00a0\t\tSysctls: nil,\n\u00a0\u00a0\t\tFSGroupChangePolicy: nil,\n\u00a0\u00a0\t\t... // 2 identical fields\n\u00a0\u00a0\t},\n-\u00a0\tImagePullSecrets: nil,\n+\u00a0\tImagePullSecrets: []v1.LocalObjectReference{{Name: \"redhat-operators-dockercfg-bksjt\"}},\n\u00a0\u00a0\tHostname: \"\",\n\u00a0\u00a0\tSubdomain: \"\",\n\u00a0\u00a0\tAffinity: nil,\n-\u00a0\tSchedulerName: \"default-scheduler\",\n+\u00a0\tSchedulerName: \"\",\n\u00a0\u00a0\tTolerations: []v1.Toleration{\n\u00a0\u00a0\t\t{Key: \"node-role.kubernetes.io/master\", Operator: \"Exists\", Effect: \"NoSchedule\"},\n\u00a0\u00a0\t\t{Key: \"node.kubernetes.io/unreachable\", Operator: \"Exists\", Effect: \"NoExecute\", TolerationSeconds: &120},\n\u00a0\u00a0\t\t{Key: \"node.kubernetes.io/not-ready\", Operator: \"Exists\", Effect: \"NoExecute\", TolerationSeconds: &120},\n-\u00a0\t\t{\n-\u00a0\t\t\tKey: \"node.kubernetes.io/memory-pressure\",\n-\u00a0\t\t\tOperator: \"Exists\",\n-\u00a0\t\t\tEffect: \"NoSchedule\",\n-\u00a0\t\t},\n\u00a0\u00a0\t},\n\u00a0\u00a0\tHostAliases: nil,\n\u00a0\u00a0\tPriorityClassName: \"system-cluster-critical\",\n-\u00a0\tPriority: &2000000000,\n+\u00a0\tPriority: nil,\n\u00a0\u00a0\tDNSConfig: nil,\n\u00a0\u00a0\tReadinessGates: nil,\n\u00a0\u00a0\tRuntimeClassName: nil,\n-\u00a0\tEnableServiceLinks: &true,\n+\u00a0\tEnableServiceLinks: nil,\n-\u00a0\tPreemptionPolicy: &\"PreemptLowerPriority\",\n+\u00a0\tPreemptionPolicy: nil,\n\u00a0\u00a0\tOverhead: nil,\n\u00a0\u00a0\tTopologySpreadConstraints: nil,\n\u00a0\u00a0\t... // 5 identical fields\n\u00a0\u00a0}\n" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-operators-mgcb9 current-pod.namespace=openshift-marketplace id=2Qz4w 2026-03-20T08:39:11.360968593Z time="2026-03-20T08:39:11Z" level=info msg="of 1 pods matching label selector, 0 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=false correctImages=true current-pod.name=redhat-operators-mgcb9 current-pod.namespace=openshift-marketplace id=2Qz4w 2026-03-20T08:39:11.360968593Z time="2026-03-20T08:39:11Z" level=info msg="registry pods invalid, need to overwrite" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2Qz4w 2026-03-20T08:39:11.360968593Z time="2026-03-20T08:39:11Z" level=info msg="deleting current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2Qz4w pod.name=redhat-operators-mgcb9 pod.namespace=openshift-marketplace 2026-03-20T08:39:11.565623016Z time="2026-03-20T08:39:11Z" level=info msg="creating desired pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iJsCu pod.name= pod.namespace=openshift-marketplace 2026-03-20T08:39:11.765896599Z time="2026-03-20T08:39:11Z" level=info msg="creating desired pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2Qz4w pod.name= pod.namespace=openshift-marketplace 2026-03-20T08:39:11.968639976Z W0320 08:39:11.967088 1 warnings.go:70] spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-20T08:39:11.968639976Z time="2026-03-20T08:39:11Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iJsCu 2026-03-20T08:39:11.968639976Z time="2026-03-20T08:39:11Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iJsCu 2026-03-20T08:39:11.980581885Z time="2026-03-20T08:39:11Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=bwtmQ 2026-03-20T08:39:11.980581885Z time="2026-03-20T08:39:11Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=bwtmQ 2026-03-20T08:39:12.166448299Z W0320 08:39:12.166381 1 warnings.go:70] spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-20T08:39:12.166955744Z time="2026-03-20T08:39:12Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2Qz4w 2026-03-20T08:39:12.166955744Z time="2026-03-20T08:39:12Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2Qz4w 2026-03-20T08:39:12.183309661Z time="2026-03-20T08:39:12Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=11uVK 2026-03-20T08:39:12.183387223Z time="2026-03-20T08:39:12Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=11uVK 2026-03-20T08:39:12.763328477Z time="2026-03-20T08:39:12Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=bwtmQ 2026-03-20T08:39:12.763328477Z time="2026-03-20T08:39:12Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-cc955 current-pod.namespace=openshift-marketplace id=bwtmQ 2026-03-20T08:39:12.763328477Z time="2026-03-20T08:39:12Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-cc955 current-pod.namespace=openshift-marketplace id=bwtmQ 2026-03-20T08:39:12.763328477Z time="2026-03-20T08:39:12Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=bwtmQ 2026-03-20T08:39:12.763328477Z time="2026-03-20T08:39:12Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=bwtmQ 2026-03-20T08:39:12.763328477Z time="2026-03-20T08:39:12Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=bwtmQ 2026-03-20T08:39:12.961368967Z time="2026-03-20T08:39:12Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=11uVK 2026-03-20T08:39:12.961604954Z time="2026-03-20T08:39:12Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-dtqgc current-pod.namespace=openshift-marketplace id=11uVK 2026-03-20T08:39:12.961604954Z time="2026-03-20T08:39:12Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-dtqgc current-pod.namespace=openshift-marketplace id=11uVK 2026-03-20T08:39:12.961642445Z time="2026-03-20T08:39:12Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=11uVK 2026-03-20T08:39:12.961642445Z time="2026-03-20T08:39:12Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=11uVK 2026-03-20T08:39:12.961653985Z time="2026-03-20T08:39:12Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=11uVK 2026-03-20T08:39:13.960759502Z time="2026-03-20T08:39:13Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=bwtmQ 2026-03-20T08:39:13.960965008Z time="2026-03-20T08:39:13Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-cc955 current-pod.namespace=openshift-marketplace id=bwtmQ 2026-03-20T08:39:13.960965008Z time="2026-03-20T08:39:13Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-cc955 current-pod.namespace=openshift-marketplace id=bwtmQ 2026-03-20T08:39:13.961104162Z time="2026-03-20T08:39:13Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=bwtmQ 2026-03-20T08:39:13.961104162Z time="2026-03-20T08:39:13Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=bwtmQ 2026-03-20T08:39:13.961232816Z time="2026-03-20T08:39:13Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=SEc8V 2026-03-20T08:39:13.961266567Z time="2026-03-20T08:39:13Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=SEc8V 2026-03-20T08:39:14.160496401Z time="2026-03-20T08:39:14Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=11uVK 2026-03-20T08:39:14.160673336Z time="2026-03-20T08:39:14Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-dtqgc current-pod.namespace=openshift-marketplace id=11uVK 2026-03-20T08:39:14.160673336Z time="2026-03-20T08:39:14Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-dtqgc current-pod.namespace=openshift-marketplace id=11uVK 2026-03-20T08:39:14.160802200Z time="2026-03-20T08:39:14Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=11uVK 2026-03-20T08:39:14.160802200Z time="2026-03-20T08:39:14Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=11uVK 2026-03-20T08:39:14.160880902Z time="2026-03-20T08:39:14Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=m4gSq 2026-03-20T08:39:14.160904443Z time="2026-03-20T08:39:14Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=m4gSq 2026-03-20T08:39:14.760815640Z time="2026-03-20T08:39:14Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=SEc8V 2026-03-20T08:39:14.760885992Z time="2026-03-20T08:39:14Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-hqqrk current-pod.namespace=openshift-marketplace id=SEc8V 2026-03-20T08:39:14.760885992Z time="2026-03-20T08:39:14Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-hqqrk current-pod.namespace=openshift-marketplace id=SEc8V 2026-03-20T08:39:14.760907803Z time="2026-03-20T08:39:14Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=SEc8V 2026-03-20T08:39:14.760939574Z time="2026-03-20T08:39:14Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=SEc8V 2026-03-20T08:39:14.760939574Z time="2026-03-20T08:39:14Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=SEc8V 2026-03-20T08:39:14.963696251Z time="2026-03-20T08:39:14Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=m4gSq 2026-03-20T08:39:14.963892037Z time="2026-03-20T08:39:14Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jstrn current-pod.namespace=openshift-marketplace id=m4gSq 2026-03-20T08:39:14.963892037Z time="2026-03-20T08:39:14Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jstrn current-pod.namespace=openshift-marketplace id=m4gSq 2026-03-20T08:39:14.963931378Z time="2026-03-20T08:39:14Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=m4gSq 2026-03-20T08:39:14.963931378Z time="2026-03-20T08:39:14Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=m4gSq 2026-03-20T08:39:14.963942478Z time="2026-03-20T08:39:14Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=m4gSq 2026-03-20T08:39:15.962154788Z time="2026-03-20T08:39:15Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=SEc8V 2026-03-20T08:39:15.962234830Z time="2026-03-20T08:39:15Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-hqqrk current-pod.namespace=openshift-marketplace id=SEc8V 2026-03-20T08:39:15.962234830Z time="2026-03-20T08:39:15Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-hqqrk current-pod.namespace=openshift-marketplace id=SEc8V 2026-03-20T08:39:15.962398955Z time="2026-03-20T08:39:15Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=SEc8V 2026-03-20T08:39:15.962398955Z time="2026-03-20T08:39:15Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=SEc8V 2026-03-20T08:39:15.962418855Z time="2026-03-20T08:39:15Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=mssWQ 2026-03-20T08:39:15.962469197Z time="2026-03-20T08:39:15Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=mssWQ 2026-03-20T08:39:16.166178272Z time="2026-03-20T08:39:16Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=m4gSq 2026-03-20T08:39:16.166178272Z time="2026-03-20T08:39:16Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jstrn current-pod.namespace=openshift-marketplace id=m4gSq 2026-03-20T08:39:16.166178272Z time="2026-03-20T08:39:16Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jstrn current-pod.namespace=openshift-marketplace id=m4gSq 2026-03-20T08:39:16.166178272Z time="2026-03-20T08:39:16Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=m4gSq 2026-03-20T08:39:16.166178272Z time="2026-03-20T08:39:16Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=m4gSq 2026-03-20T08:39:16.166178272Z time="2026-03-20T08:39:16Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=10C1+ 2026-03-20T08:39:16.166178272Z time="2026-03-20T08:39:16Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=10C1+ route-controller-manager_current.log0000640000000000000000000004353215157203665037520 0ustar0000000000000000config/pod/openshift-route-controller-manager/logs/route-controller-manager-56f686584b-fdcx52026-03-20T08:39:07.317752221Z I0320 08:39:07.317429 1 cmd.go:240] Using service-serving-cert provided certificates 2026-03-20T08:39:07.317752221Z I0320 08:39:07.317680 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-20T08:39:07.318970407Z I0320 08:39:07.318925 1 observer_polling.go:159] Starting file observer 2026-03-20T08:39:07.321053698Z I0320 08:39:07.320998 1 builder.go:298] route-controller-manager version 4.18.0-202602261953.p2.gce6ffa2.assembly.stream.el9-ce6ffa2-ce6ffa24dac3a5f49f70818e1159e40eaf27a6a3 2026-03-20T08:39:07.322433228Z I0320 08:39:07.322382 1 dynamic_serving_content.go:113] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-20T08:39:07.570564019Z I0320 08:39:07.570465 1 requestheader_controller.go:244] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-20T08:39:07.574008680Z I0320 08:39:07.573958 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-20T08:39:07.574008680Z I0320 08:39:07.573987 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-20T08:39:07.574042191Z I0320 08:39:07.574030 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-20T08:39:07.574056071Z I0320 08:39:07.574038 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-20T08:39:07.581508408Z I0320 08:39:07.581435 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-20T08:39:07.581565950Z W0320 08:39:07.581533 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-20T08:39:07.581630102Z I0320 08:39:07.581530 1 genericapiserver.go:514] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-20T08:39:07.581630102Z W0320 08:39:07.581590 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-20T08:39:07.581643242Z W0320 08:39:07.581630 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-20T08:39:07.581643242Z W0320 08:39:07.581639 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-20T08:39:07.581654273Z W0320 08:39:07.581645 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-20T08:39:07.581664093Z W0320 08:39:07.581651 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-20T08:39:07.582748225Z I0320 08:39:07.582292 1 builder.go:439] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-20T08:39:07.582748225Z I0320 08:39:07.582661 1 leaderelection.go:250] attempting to acquire leader lease openshift-route-controller-manager/openshift-route-controllers... 2026-03-20T08:39:07.584876587Z I0320 08:39:07.584822 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController 2026-03-20T08:39:07.584876587Z I0320 08:39:07.584856 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-20T08:39:07.584912408Z I0320 08:39:07.584865 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-20T08:39:07.584912408Z I0320 08:39:07.584895 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-20T08:39:07.584951149Z I0320 08:39:07.584910 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773995781\" (2026-03-20 08:36:37 +0000 UTC to 2028-03-19 08:36:38 +0000 UTC (now=2026-03-20 08:39:07.584868396 +0000 UTC))" 2026-03-20T08:39:07.585118884Z I0320 08:39:07.585011 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-20T08:39:07.585133784Z I0320 08:39:07.585123 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773995947\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773995947\" (2026-03-20 07:39:07 +0000 UTC to 2027-03-20 07:39:07 +0000 UTC (now=2026-03-20 08:39:07.585096463 +0000 UTC))" 2026-03-20T08:39:07.585162485Z I0320 08:39:07.585099 1 dynamic_serving_content.go:132] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-20T08:39:07.585162485Z I0320 08:39:07.585146 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-20T08:39:07.585213917Z I0320 08:39:07.585170 1 tlsconfig.go:240] "Starting DynamicServingCertificateController" 2026-03-20T08:39:07.585467464Z I0320 08:39:07.585208 1 genericapiserver.go:662] [graceful-termination] waiting for shutdown to be initiated 2026-03-20T08:39:07.585467464Z I0320 08:39:07.585164 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-20T08:39:07.589066609Z I0320 08:39:07.588162 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-20T08:39:07.589066609Z I0320 08:39:07.588264 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-20T08:39:07.589066609Z I0320 08:39:07.588665 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-20T08:39:07.592449958Z I0320 08:39:07.591966 1 leaderelection.go:260] successfully acquired lease openshift-route-controller-manager/openshift-route-controllers 2026-03-20T08:39:07.594441806Z I0320 08:39:07.594351 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-route-controller-manager", Name:"openshift-route-controllers", UID:"ca759037-bed7-4ee4-9f31-f28abc384d41", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"9304", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' route-controller-manager-56f686584b-fdcx5_8713fa8f-8896-4d05-8304-d0a8ed9f240e became leader 2026-03-20T08:39:07.597807764Z I0320 08:39:07.597409 1 controller_manager.go:36] Starting "openshift.io/ingress-ip" 2026-03-20T08:39:07.597807764Z I0320 08:39:07.597433 1 controller_manager.go:46] Started "openshift.io/ingress-ip" 2026-03-20T08:39:07.597807764Z I0320 08:39:07.597444 1 controller_manager.go:36] Starting "openshift.io/ingress-to-route" 2026-03-20T08:39:07.602662756Z I0320 08:39:07.602602 1 ingress.go:262] ingress-to-route metrics registered with prometheus 2026-03-20T08:39:07.602662756Z I0320 08:39:07.602634 1 controller_manager.go:46] Started "openshift.io/ingress-to-route" 2026-03-20T08:39:07.602662756Z I0320 08:39:07.602646 1 controller_manager.go:48] Started Route Controllers 2026-03-20T08:39:07.604066547Z I0320 08:39:07.603084 1 ingress.go:313] Starting controller 2026-03-20T08:39:07.607205388Z W0320 08:39:07.607016 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-20T08:39:07.607205388Z E0320 08:39:07.607137 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-20T08:39:07.607225199Z I0320 08:39:07.607205 1 reflector.go:359] Caches populated for *v1.Ingress from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-20T08:39:07.608598849Z I0320 08:39:07.608566 1 reflector.go:359] Caches populated for *v1.IngressClass from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-20T08:39:07.620640350Z I0320 08:39:07.620559 1 reflector.go:359] Caches populated for *v1.Service from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-20T08:39:07.687569344Z I0320 08:39:07.687467 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-20T08:39:07.687569344Z I0320 08:39:07.687560 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-20T08:39:07.687670077Z I0320 08:39:07.687596 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-20T08:39:07.687950785Z I0320 08:39:07.687896 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-20 08:18:48 +0000 UTC to 2036-03-17 08:18:48 +0000 UTC (now=2026-03-20 08:39:07.687853602 +0000 UTC))" 2026-03-20T08:39:07.687950785Z I0320 08:39:07.687939 1 tlsconfig.go:178] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-20 08:25:35 +0000 UTC to 2026-03-21 08:25:35 +0000 UTC (now=2026-03-20 08:39:07.687918334 +0000 UTC))" 2026-03-20T08:39:07.687965465Z I0320 08:39:07.687954 1 tlsconfig.go:178] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-20 08:25:35 +0000 UTC to 2027-03-20 08:25:35 +0000 UTC (now=2026-03-20 08:39:07.687945675 +0000 UTC))" 2026-03-20T08:39:07.687977686Z I0320 08:39:07.687970 1 tlsconfig.go:178] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-20 08:25:35 +0000 UTC to 2027-03-20 08:25:35 +0000 UTC (now=2026-03-20 08:39:07.687960235 +0000 UTC))" 2026-03-20T08:39:07.688007636Z I0320 08:39:07.687984 1 tlsconfig.go:178] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-20 08:25:32 +0000 UTC to 2036-03-17 08:25:32 +0000 UTC (now=2026-03-20 08:39:07.687975246 +0000 UTC))" 2026-03-20T08:39:07.688212042Z I0320 08:39:07.688170 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773995781\" (2026-03-20 08:36:37 +0000 UTC to 2028-03-19 08:36:38 +0000 UTC (now=2026-03-20 08:39:07.6881418 +0000 UTC))" 2026-03-20T08:39:07.688382397Z I0320 08:39:07.688342 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773995947\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773995947\" (2026-03-20 07:39:07 +0000 UTC to 2027-03-20 07:39:07 +0000 UTC (now=2026-03-20 08:39:07.688327716 +0000 UTC))" 2026-03-20T08:39:07.688491381Z I0320 08:39:07.688452 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-20 08:18:48 +0000 UTC to 2036-03-17 08:18:48 +0000 UTC (now=2026-03-20 08:39:07.688441959 +0000 UTC))" 2026-03-20T08:39:07.688491381Z I0320 08:39:07.688475 1 tlsconfig.go:178] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-20 08:25:35 +0000 UTC to 2026-03-21 08:25:35 +0000 UTC (now=2026-03-20 08:39:07.68846537 +0000 UTC))" 2026-03-20T08:39:07.688503131Z I0320 08:39:07.688490 1 tlsconfig.go:178] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-20 08:25:35 +0000 UTC to 2027-03-20 08:25:35 +0000 UTC (now=2026-03-20 08:39:07.68848036 +0000 UTC))" 2026-03-20T08:39:07.688512981Z I0320 08:39:07.688504 1 tlsconfig.go:178] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-20 08:25:35 +0000 UTC to 2027-03-20 08:25:35 +0000 UTC (now=2026-03-20 08:39:07.688495811 +0000 UTC))" 2026-03-20T08:39:07.688542202Z I0320 08:39:07.688520 1 tlsconfig.go:178] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-20 08:25:32 +0000 UTC to 2036-03-17 08:25:32 +0000 UTC (now=2026-03-20 08:39:07.688509691 +0000 UTC))" 2026-03-20T08:39:07.688542202Z I0320 08:39:07.688537 1 tlsconfig.go:178] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-20 08:25:32 +0000 UTC to 2026-03-21 08:25:32 +0000 UTC (now=2026-03-20 08:39:07.688528762 +0000 UTC))" 2026-03-20T08:39:07.688678556Z I0320 08:39:07.688641 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773995781\" (2026-03-20 08:36:37 +0000 UTC to 2028-03-19 08:36:38 +0000 UTC (now=2026-03-20 08:39:07.688629665 +0000 UTC))" 2026-03-20T08:39:07.688770029Z I0320 08:39:07.688745 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773995947\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773995947\" (2026-03-20 07:39:07 +0000 UTC to 2027-03-20 07:39:07 +0000 UTC (now=2026-03-20 08:39:07.688734578 +0000 UTC))" 2026-03-20T08:39:07.707899207Z I0320 08:39:07.704960 1 reflector.go:359] Caches populated for *v1.Secret from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-20T08:39:08.721117535Z W0320 08:39:08.721014 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-20T08:39:08.721117535Z E0320 08:39:08.721054 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-20T08:39:11.688084439Z W0320 08:39:11.687687 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-20T08:39:11.688084439Z E0320 08:39:11.687745 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-20T08:39:15.533273862Z W0320 08:39:15.533202 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-20T08:39:15.533273862Z E0320 08:39:15.533240 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) controller-manager_current.log0000640000000000000000000005261215157203665034234 0ustar0000000000000000config/pod/openshift-controller-manager/logs/controller-manager-fc56bb77c-qd4sn2026-03-20T08:39:07.631702033Z I0320 08:39:07.631430 1 shared_informer.go:313] Waiting for caches to sync for openshift.io/internal-image-registry-pull-secrets_service-account 2026-03-20T08:39:07.631702033Z I0320 08:39:07.631481 1 image_pull_secret_controller.go:372] "Starting controller" name="openshift.io/internal-image-registry-pull-secrets_image-pull-secret" 2026-03-20T08:39:07.631702033Z I0320 08:39:07.631493 1 shared_informer.go:313] Waiting for caches to sync for openshift.io/internal-image-registry-pull-secrets_image-pull-secret 2026-03-20T08:39:07.631702033Z I0320 08:39:07.631516 1 registry_urls_observation_controller.go:140] "Starting controller" name="openshift.io/internal-image-registry-pull-secrets_urls" 2026-03-20T08:39:07.631702033Z I0320 08:39:07.631523 1 shared_informer.go:313] Waiting for caches to sync for openshift.io/internal-image-registry-pull-secrets_urls 2026-03-20T08:39:07.631702033Z I0320 08:39:07.631547 1 legacy_token_secret_controller.go:103] "Starting controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-token-secret" 2026-03-20T08:39:07.631702033Z I0320 08:39:07.631554 1 shared_informer.go:313] Waiting for caches to sync for openshift.io/internal-image-registry-pull-secrets_legacy-token-secret 2026-03-20T08:39:07.631702033Z I0320 08:39:07.631584 1 controller_manager.go:156] Started "openshift.io/serviceaccount-pull-secrets" 2026-03-20T08:39:07.631702033Z I0320 08:39:07.631598 1 controller_manager.go:146] Starting "openshift.io/deployer-serviceaccount" 2026-03-20T08:39:07.631702033Z I0320 08:39:07.631658 1 legacy_image_pull_secret_controller.go:131] "Starting controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-image-pull-secret" 2026-03-20T08:39:07.631702033Z I0320 08:39:07.631670 1 shared_informer.go:313] Waiting for caches to sync for openshift.io/internal-image-registry-pull-secrets_legacy-image-pull-secret 2026-03-20T08:39:07.637352048Z I0320 08:39:07.637290 1 controller_manager.go:156] Started "openshift.io/deployer-serviceaccount" 2026-03-20T08:39:07.637352048Z I0320 08:39:07.637324 1 controller_manager.go:161] Started Origin Controllers 2026-03-20T08:39:07.638036988Z I0320 08:39:07.637977 1 serviceaccounts_controller.go:114] "Starting service account controller" 2026-03-20T08:39:07.638036988Z I0320 08:39:07.638013 1 shared_informer.go:313] Waiting for caches to sync for service account 2026-03-20T08:39:07.646349941Z I0320 08:39:07.644167 1 reflector.go:368] Caches populated for *v1alpha1.ImageContentSourcePolicy from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.646488535Z W0320 08:39:07.646434 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-03-20T08:39:07.646551157Z E0320 08:39:07.646509 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-03-20T08:39:07.646809254Z I0320 08:39:07.646751 1 reflector.go:368] Caches populated for *v1.ImageDigestMirrorSet from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.657860557Z W0320 08:39:07.656049 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-03-20T08:39:07.657860557Z E0320 08:39:07.656132 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-03-20T08:39:07.657860557Z I0320 08:39:07.656173 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.657860557Z W0320 08:39:07.656288 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-03-20T08:39:07.657860557Z E0320 08:39:07.656351 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-03-20T08:39:07.657860557Z I0320 08:39:07.656567 1 reflector.go:368] Caches populated for *v1.CronJob from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.657860557Z I0320 08:39:07.656902 1 reflector.go:368] Caches populated for *v1.Proxy from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.657860557Z I0320 08:39:07.657068 1 reflector.go:368] Caches populated for *v1.ImageTagMirrorSet from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.657860557Z I0320 08:39:07.657231 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.657860557Z W0320 08:39:07.657424 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-03-20T08:39:07.657860557Z E0320 08:39:07.657450 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-03-20T08:39:07.657860557Z W0320 08:39:07.657613 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-20T08:39:07.657860557Z E0320 08:39:07.657656 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-20T08:39:07.657860557Z I0320 08:39:07.657782 1 reflector.go:368] Caches populated for *v1.Build from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.658788944Z W0320 08:39:07.657952 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-03-20T08:39:07.658788944Z E0320 08:39:07.658414 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-03-20T08:39:07.658788944Z I0320 08:39:07.658418 1 reflector.go:368] Caches populated for *v1.Image from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.660881785Z I0320 08:39:07.659594 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.663627965Z I0320 08:39:07.663579 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.664622394Z I0320 08:39:07.664585 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.664904512Z I0320 08:39:07.664876 1 reflector.go:368] Caches populated for *v1.RoleBinding from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.669330251Z I0320 08:39:07.669297 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.670023152Z I0320 08:39:07.669995 1 reflector.go:368] Caches populated for *v1.DaemonSet from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.688157581Z I0320 08:39:07.688058 1 reflector.go:368] Caches populated for *v1.Deployment from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.692722914Z I0320 08:39:07.692695 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.698237125Z I0320 08:39:07.698168 1 reflector.go:368] Caches populated for *v1.Event from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.698990167Z I0320 08:39:07.698949 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.710955726Z I0320 08:39:07.710886 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:07.722018189Z I0320 08:39:07.721965 1 shared_informer.go:320] Caches are synced for DeployerRoleBindingController 2026-03-20T08:39:07.731686921Z I0320 08:39:07.731641 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_legacy-token-secret 2026-03-20T08:39:07.731770564Z I0320 08:39:07.731742 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_urls 2026-03-20T08:39:07.731770564Z I0320 08:39:07.731668 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_kids 2026-03-20T08:39:07.731783024Z I0320 08:39:07.731772 1 registry_urls_observation_controller.go:147] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_urls" 2026-03-20T08:39:07.731807435Z I0320 08:39:07.731777 1 keyid_observation_controller.go:172] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_kids" 2026-03-20T08:39:07.731807435Z I0320 08:39:07.731745 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_image-pull-secret 2026-03-20T08:39:07.731815385Z I0320 08:39:07.731806 1 image_pull_secret_controller.go:398] Waiting for service account token signing cert to be observed 2026-03-20T08:39:07.731824655Z I0320 08:39:07.731818 1 image_pull_secret_controller.go:384] Waiting for image registry urls to be observed 2026-03-20T08:39:07.731833935Z I0320 08:39:07.731695 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_service-account 2026-03-20T08:39:07.731869677Z I0320 08:39:07.731847 1 service_account_controller.go:346] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_service-account" 2026-03-20T08:39:07.731890927Z I0320 08:39:07.731847 1 legacy_token_secret_controller.go:110] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-token-secret" 2026-03-20T08:39:07.732033221Z I0320 08:39:07.732002 1 image_pull_secret_controller.go:401] "Observed service account token signing certs" kids=["PKPaiyV0NYQDHLgL9NCncHGlhbOZY4uGLF0AM4fEUzc"] 2026-03-20T08:39:07.732111124Z I0320 08:39:07.732099 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_legacy-image-pull-secret 2026-03-20T08:39:07.732145045Z I0320 08:39:07.732133 1 legacy_image_pull_secret_controller.go:138] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-image-pull-secret" 2026-03-20T08:39:07.733814743Z I0320 08:39:07.733778 1 shared_informer.go:320] Caches are synced for ImagePullerRoleBindingController 2026-03-20T08:39:07.740630562Z I0320 08:39:07.740568 1 shared_informer.go:320] Caches are synced for service account 2026-03-20T08:39:07.745951767Z I0320 08:39:07.745919 1 shared_informer.go:320] Caches are synced for service account 2026-03-20T08:39:07.762000906Z I0320 08:39:07.761946 1 shared_informer.go:320] Caches are synced for BuilderRoleBindingController 2026-03-20T08:39:07.774405068Z I0320 08:39:07.774234 1 factory.go:80] Deployer controller caches are synced. Starting workers. 2026-03-20T08:39:07.842748662Z I0320 08:39:07.842671 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-20T08:39:08.582883981Z W0320 08:39:08.582696 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-03-20T08:39:08.582883981Z E0320 08:39:08.582761 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-03-20T08:39:08.644995093Z W0320 08:39:08.644624 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-03-20T08:39:08.644995093Z E0320 08:39:08.644679 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-03-20T08:39:08.752240953Z W0320 08:39:08.749501 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-03-20T08:39:08.752240953Z E0320 08:39:08.749571 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-03-20T08:39:08.895453332Z W0320 08:39:08.894741 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-03-20T08:39:08.895453332Z E0320 08:39:08.894794 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-03-20T08:39:08.930259198Z W0320 08:39:08.929651 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-20T08:39:08.930259198Z E0320 08:39:08.929721 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-20T08:39:09.140288547Z W0320 08:39:09.140156 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-03-20T08:39:09.140288547Z E0320 08:39:09.140234 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-03-20T08:39:10.367752398Z W0320 08:39:10.367622 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-03-20T08:39:10.367752398Z E0320 08:39:10.367688 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-03-20T08:39:10.778003891Z W0320 08:39:10.777688 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-20T08:39:10.778003891Z E0320 08:39:10.777744 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-20T08:39:10.888585968Z W0320 08:39:10.888505 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-03-20T08:39:10.888585968Z E0320 08:39:10.888569 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-03-20T08:39:10.995488088Z W0320 08:39:10.995400 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-03-20T08:39:10.995488088Z E0320 08:39:10.995455 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-03-20T08:39:11.204245470Z W0320 08:39:11.204158 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-03-20T08:39:11.204245470Z E0320 08:39:11.204230 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-03-20T08:39:11.379937687Z W0320 08:39:11.376416 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-03-20T08:39:11.379937687Z E0320 08:39:11.376500 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-03-20T08:39:14.546151956Z W0320 08:39:14.544363 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-03-20T08:39:14.546151956Z E0320 08:39:14.544429 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-03-20T08:39:14.698792010Z W0320 08:39:14.698714 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-20T08:39:14.698792010Z E0320 08:39:14.698776 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-20T08:39:15.241263830Z W0320 08:39:15.240364 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-03-20T08:39:15.241263830Z E0320 08:39:15.240418 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-03-20T08:39:15.370135411Z W0320 08:39:15.370041 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-03-20T08:39:15.370135411Z E0320 08:39:15.370099 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" openshift-controller-manager-operator_current.log0000640000000000000000000001067315157203665045265 0ustar0000000000000000config/pod/openshift-controller-manager-operator/logs/openshift-controller-manager-operator-8c94f4649-p7pt62026-03-20T08:37:41.080877917Z I0320 08:37:41.080639 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-20T08:37:41.080877917Z I0320 08:37:41.080844 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-20T08:37:41.081444443Z I0320 08:37:41.081380 1 observer_polling.go:159] Starting file observer 2026-03-20T08:38:41.088790399Z W0320 08:38:41.088675 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-controller-manager-operator-8c94f4649-p7pt6) 2026-03-20T08:38:41.088986945Z I0320 08:38:41.088941 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202602261953.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254 2026-03-20T08:38:50.810281974Z I0320 08:38:50.806766 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-20T08:38:50.810281974Z W0320 08:38:50.806808 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-20T08:38:50.810281974Z W0320 08:38:50.806817 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-20T08:38:50.810281974Z W0320 08:38:50.806822 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-20T08:38:50.810281974Z W0320 08:38:50.806827 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-20T08:38:50.810281974Z W0320 08:38:50.806832 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-20T08:38:50.810281974Z W0320 08:38:50.806836 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-20T08:38:50.823464729Z I0320 08:38:50.823403 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-20T08:38:50.823550871Z I0320 08:38:50.823540 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-20T08:38:50.823677065Z I0320 08:38:50.823618 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-20T08:38:50.823707336Z I0320 08:38:50.823698 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-20T08:38:50.823746827Z I0320 08:38:50.823734 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-20T08:38:50.823769938Z I0320 08:38:50.823761 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-20T08:38:50.823975514Z I0320 08:38:50.823933 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-20T08:38:50.824051576Z I0320 08:38:50.824022 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-20T08:38:50.824227391Z I0320 08:38:50.824202 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-20T08:38:50.924435058Z I0320 08:38:50.924333 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-20T08:38:50.924564851Z I0320 08:38:50.924529 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-20T08:38:50.925257922Z I0320 08:38:50.925215 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-20T08:38:53.367906197Z I0320 08:38:53.367820 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-20T08:38:53.368343340Z I0320 08:38:53.368317 1 leaderelection.go:254] attempting to acquire leader lease openshift-controller-manager-operator/openshift-controller-manager-operator-lock... openshift-controller-manager-operator_previous.log0000640000000000000000000015306715157203665045464 0ustar0000000000000000config/pod/openshift-controller-manager-operator/logs/openshift-controller-manager-operator-8c94f4649-p7pt62026-03-20T08:36:21.383306177Z I0320 08:36:21.382717 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:update-buildconfig-status because it was missing 2026-03-20T08:36:21.390832916Z I0320 08:36:21.390774 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/system:deployer because it was missing 2026-03-20T08:36:21.400307273Z I0320 08:36:21.400215 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/system:deployer because it was missing 2026-03-20T08:36:21.410758858Z I0320 08:36:21.410696 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:image-trigger-controller because it was missing 2026-03-20T08:36:21.421588824Z I0320 08:36:21.421486 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:image-trigger-controller because it was missing 2026-03-20T08:36:21.943485144Z W0320 08:36:21.943312 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-20T08:36:21.943688620Z I0320 08:36:21.943646 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it was missing 2026-03-20T08:36:22.608880303Z E0320 08:36:22.608806 1 operator.go:174] "Unhandled Error" err="key failed with : Operation cannot be fulfilled on openshiftcontrollermanagers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-20T08:36:23.014137839Z E0320 08:36:23.014016 1 base_controller.go:279] "Unhandled Error" err="OpenshiftControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/openshift-controller-manager/leader-role.yaml\" (string): namespaces \"openshift-controller-manager\" not found, \"assets/openshift-controller-manager/leader-rolebinding.yaml\" (string): namespaces \"openshift-controller-manager\" not found, \"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\" (string): namespaces \"openshift-route-controller-manager\" not found, \"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\" (string): namespaces \"openshift-route-controller-manager\" not found]" 2026-03-20T08:36:23.032570507Z I0320 08:36:23.032514 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager because it was missing 2026-03-20T08:36:23.043307830Z I0320 08:36:23.043221 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager because it was missing 2026-03-20T08:36:23.056223587Z I0320 08:36:23.055687 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager because it was missing 2026-03-20T08:36:23.145332428Z I0320 08:36:23.144298 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager because it was missing 2026-03-20T08:36:23.452925253Z I0320 08:36:23.452857 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/config -n openshift-controller-manager because it was missing 2026-03-20T08:36:23.477422478Z I0320 08:36:23.477326 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created configmap/openshift-service-ca-n openshift-controller-manager because it was missing 2026-03-20T08:36:23.493437105Z I0320 08:36:23.493369 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/config -n openshift-route-controller-manager because it was missing 2026-03-20T08:36:23.500652016Z I0320 08:36:23.500580 1 apps.go:155] Deployment "openshift-controller-manager/controller-manager" changes: {"metadata":{"annotations":{"operator.openshift.io/spec-hash":"61285e1daa600a65319348448329b9c9442514b42fbdc51f805d4e8deb3d83f6"}},"spec":{"progressDeadlineSeconds":null,"revisionHistoryLimit":null,"template":{"metadata":{"annotations":{"configmaps/config":"4618","configmaps/openshift-global-ca":"4352","configmaps/openshift-service-ca":"4622","openshiftcontrollermanagers.operator.openshift.io/cluster":"2"}},"spec":{"containers":[{"args":["--config=/var/run/configmaps/config/config.yaml","-v=2"],"command":["openshift-controller-manager","start"],"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","imagePullPolicy":"IfNotPresent","livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30},"name":"controller-manager","ports":[{"containerPort":8443}],"readinessProbe":{"failureThreshold":10,"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"}},"resources":{"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]}},"terminationMessagePolicy":"FallbackToLogsOnError","volumeMounts":[{"mountPath":"/var/run/configmaps/config","name":"config"},{"mountPath":"/var/run/configmaps/client-ca","name":"client-ca"},{"mountPath":"/var/run/secrets/serving-cert","name":"serving-cert"},{"mountPath":"/etc/pki/ca-trust/extracted/pem","name":"proxy-ca-bundles"}]}],"dnsPolicy":null,"restartPolicy":null,"schedulerName":null,"serviceAccount":null,"terminationGracePeriodSeconds":null,"volumes":[{"configMap":{"name":"config"},"name":"config"},{"configMap":{"name":"client-ca"},"name":"client-ca"},{"name":"serving-cert","secret":{"secretName":"serving-cert"}},{"configMap":{"items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"name":"openshift-global-ca"},"name":"proxy-ca-bundles"}]}}}} 2026-03-20T08:36:23.513105600Z W0320 08:36:23.513059 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-20T08:36:23.513515271Z I0320 08:36:23.513439 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentUpdated' Updated Deployment.apps/controller-manager -n openshift-controller-manager because it changed 2026-03-20T08:36:23.523820062Z I0320 08:36:23.523759 1 apps.go:155] Deployment "openshift-route-controller-manager/route-controller-manager" changes: {"metadata":{"annotations":{"operator.openshift.io/spec-hash":"27b0352bd91ac2f7b8079e3938ef90020e7d3ea8fad3389c9d956b193f81a337"}},"spec":{"progressDeadlineSeconds":null,"revisionHistoryLimit":null,"template":{"metadata":{"annotations":{"configmaps/config":"4624","openshiftcontrollermanagers.operator.openshift.io/cluster":"2"}},"spec":{"containers":[{"args":["--config=/var/run/configmaps/config/config.yaml","-v=2"],"command":["route-controller-manager","start"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}}],"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b","imagePullPolicy":"IfNotPresent","livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30},"name":"route-controller-manager","ports":[{"containerPort":8443}],"readinessProbe":{"failureThreshold":10,"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"}},"resources":{"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]}},"terminationMessagePolicy":"FallbackToLogsOnError","volumeMounts":[{"mountPath":"/var/run/configmaps/config","name":"config"},{"mountPath":"/var/run/configmaps/client-ca","name":"client-ca"},{"mountPath":"/var/run/secrets/serving-cert","name":"serving-cert"}]}],"dnsPolicy":null,"restartPolicy":null,"schedulerName":null,"serviceAccount":null,"terminationGracePeriodSeconds":null,"volumes":[{"configMap":{"name":"config"},"name":"config"},{"configMap":{"name":"client-ca"},"name":"client-ca"},{"name":"serving-cert","secret":{"secretName":"serving-cert"}}]}}}} 2026-03-20T08:36:23.532848456Z W0320 08:36:23.532790 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-20T08:36:23.533595527Z I0320 08:36:23.533536 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentUpdated' Updated Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it changed 2026-03-20T08:36:24.210247814Z I0320 08:36:24.207197 1 status_controller.go:225] clusteroperator/openshift-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-20T08:36:20Z","message":"OpenshiftControllerManagerStaticResourcesDegraded: \"assets/openshift-controller-manager/leader-role.yaml\" (string): namespaces \"openshift-controller-manager\" not found\nOpenshiftControllerManagerStaticResourcesDegraded: \"assets/openshift-controller-manager/leader-rolebinding.yaml\" (string): namespaces \"openshift-controller-manager\" not found\nOpenshiftControllerManagerStaticResourcesDegraded: \"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\" (string): namespaces \"openshift-route-controller-manager\" not found\nOpenshiftControllerManagerStaticResourcesDegraded: \"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\" (string): namespaces \"openshift-route-controller-manager\" not found\nOpenshiftControllerManagerStaticResourcesDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData","status":"Unknown","type":"Progressing"},{"lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData","status":"Unknown","type":"Available"},{"lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData","status":"Unknown","type":"Upgradeable"},{"lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-20T08:36:24.215426115Z I0320 08:36:24.215340 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/openshift-controller-manager changed: Degraded message changed from "All is well" to "OpenshiftControllerManagerStaticResourcesDegraded: \"assets/openshift-controller-manager/leader-role.yaml\" (string): namespaces \"openshift-controller-manager\" not found\nOpenshiftControllerManagerStaticResourcesDegraded: \"assets/openshift-controller-manager/leader-rolebinding.yaml\" (string): namespaces \"openshift-controller-manager\" not found\nOpenshiftControllerManagerStaticResourcesDegraded: \"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\" (string): namespaces \"openshift-route-controller-manager\" not found\nOpenshiftControllerManagerStaticResourcesDegraded: \"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\" (string): namespaces \"openshift-route-controller-manager\" not found\nOpenshiftControllerManagerStaticResourcesDegraded: " 2026-03-20T08:36:25.008015535Z I0320 08:36:25.007323 1 status_controller.go:225] clusteroperator/openshift-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-20T08:36:20Z","message":"OpenshiftControllerManagerStaticResourcesDegraded: \"assets/openshift-controller-manager/leader-role.yaml\" (string): namespaces \"openshift-controller-manager\" not found\nOpenshiftControllerManagerStaticResourcesDegraded: \"assets/openshift-controller-manager/leader-rolebinding.yaml\" (string): namespaces \"openshift-controller-manager\" not found\nOpenshiftControllerManagerStaticResourcesDegraded: \"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\" (string): namespaces \"openshift-route-controller-manager\" not found\nOpenshiftControllerManagerStaticResourcesDegraded: \"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\" (string): namespaces \"openshift-route-controller-manager\" not found\nOpenshiftControllerManagerStaticResourcesDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData","status":"Unknown","type":"Progressing"},{"lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData","status":"Unknown","type":"Available"},{"lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData","status":"Unknown","type":"Upgradeable"},{"lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-20T08:36:25.024235109Z E0320 08:36:25.021258 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_openshift-controller-manager reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"openshift-controller-manager\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-20T08:36:25.819262140Z I0320 08:36:25.819147 1 status_controller.go:225] clusteroperator/openshift-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-20T08:36:20Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-20T08:36:25Z","message":"Progressing: deployment/controller-manager: observed generation is 1, desired generation is 2.\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 0, desired generation is 2.","reason":"_DesiredStateNotYetAchieved","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-20T08:36:25Z","message":"Available: no pods available on any node.","reason":"_NoPodsAvailable","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-20T08:36:25Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-20T08:36:25.832815335Z I0320 08:36:25.832717 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/openshift-controller-manager changed: Degraded message changed from "OpenshiftControllerManagerStaticResourcesDegraded: \"assets/openshift-controller-manager/leader-role.yaml\" (string): namespaces \"openshift-controller-manager\" not found\nOpenshiftControllerManagerStaticResourcesDegraded: \"assets/openshift-controller-manager/leader-rolebinding.yaml\" (string): namespaces \"openshift-controller-manager\" not found\nOpenshiftControllerManagerStaticResourcesDegraded: \"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\" (string): namespaces \"openshift-route-controller-manager\" not found\nOpenshiftControllerManagerStaticResourcesDegraded: \"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\" (string): namespaces \"openshift-route-controller-manager\" not found\nOpenshiftControllerManagerStaticResourcesDegraded: " to "All is well",Progressing changed from Unknown to True ("Progressing: deployment/controller-manager: observed generation is 1, desired generation is 2.\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas > 1\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas > 1\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 0, desired generation is 2."),Available changed from Unknown to False ("Available: no pods available on any node."),Upgradeable changed from Unknown to True ("All is well") 2026-03-20T08:36:27.819234184Z I0320 08:36:27.816408 1 status_controller.go:225] clusteroperator/openshift-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-20T08:36:20Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-20T08:36:25Z","message":"Progressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1","reason":"_DesiredStateNotYetAchieved","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-20T08:36:25Z","message":"Available: no pods available on any node.","reason":"_NoPodsAvailable","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-20T08:36:25Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-20T08:36:27.839872957Z I0320 08:36:27.835754 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from "Progressing: deployment/controller-manager: observed generation is 1, desired generation is 2.\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas > 1\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas > 1\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 0, desired generation is 2." to "Progressing: deployment/controller-manager: available replicas is 0, desired available replicas > 1\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas > 1" 2026-03-20T08:36:40.612813997Z I0320 08:36:40.611412 1 core.go:352] ConfigMap "openshift-controller-manager/config" changes: {"apiVersion":"v1","data":{"openshift-controller-manager.serving-cert.secret":"ixjSYg=="},"kind":"ConfigMap","metadata":{"creationTimestamp":null,"managedFields":null,"resourceVersion":null,"uid":null}} 2026-03-20T08:36:40.612813997Z I0320 08:36:40.612331 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapUpdated' Updated ConfigMap/config -n openshift-controller-manager: 2026-03-20T08:36:40.612813997Z cause by changes in data.openshift-controller-manager.serving-cert.secret 2026-03-20T08:36:40.809903058Z I0320 08:36:40.809814 1 core.go:352] ConfigMap "openshift-route-controller-manager/config" changes: {"apiVersion":"v1","data":{"openshift-route-controller-manager.serving-cert.secret":"TRWbLw=="},"kind":"ConfigMap","metadata":{"creationTimestamp":null,"managedFields":null,"resourceVersion":null,"uid":null}} 2026-03-20T08:36:40.810095654Z I0320 08:36:40.810068 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapUpdated' Updated ConfigMap/config -n openshift-route-controller-manager: 2026-03-20T08:36:40.810095654Z cause by changes in data.openshift-route-controller-manager.serving-cert.secret 2026-03-20T08:36:40.928896011Z I0320 08:36:40.928820 1 apps.go:155] Deployment "openshift-controller-manager/controller-manager" changes: {"metadata":{"annotations":{"operator.openshift.io/spec-hash":"18e4faed1b55fb4ed26dc6c8c139b26fa461c155203750bfd38d32ae5dd9b8da"}},"spec":{"progressDeadlineSeconds":null,"revisionHistoryLimit":null,"template":{"metadata":{"annotations":{"configmaps/config":"5843","configmaps/openshift-service-ca":"5124"}},"spec":{"containers":[{"args":["--config=/var/run/configmaps/config/config.yaml","-v=2"],"command":["openshift-controller-manager","start"],"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","imagePullPolicy":"IfNotPresent","livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30},"name":"controller-manager","ports":[{"containerPort":8443}],"readinessProbe":{"failureThreshold":10,"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"}},"resources":{"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]}},"terminationMessagePolicy":"FallbackToLogsOnError","volumeMounts":[{"mountPath":"/var/run/configmaps/config","name":"config"},{"mountPath":"/var/run/configmaps/client-ca","name":"client-ca"},{"mountPath":"/var/run/secrets/serving-cert","name":"serving-cert"},{"mountPath":"/etc/pki/ca-trust/extracted/pem","name":"proxy-ca-bundles"}]}],"dnsPolicy":null,"restartPolicy":null,"schedulerName":null,"serviceAccount":null,"terminationGracePeriodSeconds":null,"volumes":[{"configMap":{"name":"config"},"name":"config"},{"configMap":{"name":"client-ca"},"name":"client-ca"},{"name":"serving-cert","secret":{"secretName":"serving-cert"}},{"configMap":{"items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"name":"openshift-global-ca"},"name":"proxy-ca-bundles"}]}}}} 2026-03-20T08:36:40.977285503Z W0320 08:36:40.976869 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-20T08:36:40.977590682Z I0320 08:36:40.977499 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentUpdated' Updated Deployment.apps/controller-manager -n openshift-controller-manager because it changed 2026-03-20T08:36:41.012810380Z I0320 08:36:41.012689 1 apps.go:155] Deployment "openshift-route-controller-manager/route-controller-manager" changes: {"metadata":{"annotations":{"operator.openshift.io/spec-hash":"21acff2f9b8480d91189fe7a9c64173bf859f7bfeaa4d8e28e738c1bdbd92dba"}},"spec":{"progressDeadlineSeconds":null,"revisionHistoryLimit":null,"template":{"metadata":{"annotations":{"configmaps/config":"5882"}},"spec":{"containers":[{"args":["--config=/var/run/configmaps/config/config.yaml","-v=2"],"command":["route-controller-manager","start"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}}],"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b","imagePullPolicy":"IfNotPresent","livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30},"name":"route-controller-manager","ports":[{"containerPort":8443}],"readinessProbe":{"failureThreshold":10,"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"}},"resources":{"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]}},"terminationMessagePolicy":"FallbackToLogsOnError","volumeMounts":[{"mountPath":"/var/run/configmaps/config","name":"config"},{"mountPath":"/var/run/configmaps/client-ca","name":"client-ca"},{"mountPath":"/var/run/secrets/serving-cert","name":"serving-cert"}]}],"dnsPolicy":null,"restartPolicy":null,"schedulerName":null,"serviceAccount":null,"terminationGracePeriodSeconds":null,"volumes":[{"configMap":{"name":"config"},"name":"config"},{"configMap":{"name":"client-ca"},"name":"client-ca"},{"name":"serving-cert","secret":{"secretName":"serving-cert"}}]}}}} 2026-03-20T08:36:41.062505060Z W0320 08:36:41.061945 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-20T08:36:41.064982772Z I0320 08:36:41.062888 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentUpdated' Updated Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it changed 2026-03-20T08:36:41.754467183Z I0320 08:36:41.751458 1 status_controller.go:225] clusteroperator/openshift-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-20T08:36:20Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-20T08:36:25Z","message":"Progressing: deployment/controller-manager: observed generation is 2, desired generation is 3.\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3.\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1","reason":"_DesiredStateNotYetAchieved","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-20T08:36:25Z","message":"Available: no pods available on any node.","reason":"_NoPodsAvailable","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-20T08:36:25Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-20T08:36:41.795722716Z I0320 08:36:41.794130 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from "Progressing: deployment/controller-manager: available replicas is 0, desired available replicas > 1\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas > 1" to "Progressing: deployment/controller-manager: observed generation is 2, desired generation is 3.\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas > 1\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3.\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas > 1" 2026-03-20T08:37:00.513845542Z I0320 08:37:00.512666 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/client-ca -n openshift-controller-manager because it was missing 2026-03-20T08:37:00.541209591Z I0320 08:37:00.541080 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/client-ca -n openshift-route-controller-manager because it was missing 2026-03-20T08:37:00.546043662Z I0320 08:37:00.545962 1 apps.go:155] Deployment "openshift-controller-manager/controller-manager" changes: {"metadata":{"annotations":{"operator.openshift.io/spec-hash":"c3f2ca89b0f1744b7daa414e584fea109e0a3374cf1e51ba689c98440355b65d"}},"spec":{"progressDeadlineSeconds":null,"revisionHistoryLimit":null,"template":{"metadata":{"annotations":{"configmaps/client-ca":"7398"}},"spec":{"containers":[{"args":["--config=/var/run/configmaps/config/config.yaml","-v=2"],"command":["openshift-controller-manager","start"],"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","imagePullPolicy":"IfNotPresent","livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30},"name":"controller-manager","ports":[{"containerPort":8443}],"readinessProbe":{"failureThreshold":10,"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"}},"resources":{"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]}},"terminationMessagePolicy":"FallbackToLogsOnError","volumeMounts":[{"mountPath":"/var/run/configmaps/config","name":"config"},{"mountPath":"/var/run/configmaps/client-ca","name":"client-ca"},{"mountPath":"/var/run/secrets/serving-cert","name":"serving-cert"},{"mountPath":"/etc/pki/ca-trust/extracted/pem","name":"proxy-ca-bundles"}]}],"dnsPolicy":null,"restartPolicy":null,"schedulerName":null,"serviceAccount":null,"terminationGracePeriodSeconds":null,"volumes":[{"configMap":{"name":"config"},"name":"config"},{"configMap":{"name":"client-ca"},"name":"client-ca"},{"name":"serving-cert","secret":{"secretName":"serving-cert"}},{"configMap":{"items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"name":"openshift-global-ca"},"name":"proxy-ca-bundles"}]}}}} 2026-03-20T08:37:00.556723944Z W0320 08:37:00.555442 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-20T08:37:00.557005302Z I0320 08:37:00.556965 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentUpdated' Updated Deployment.apps/controller-manager -n openshift-controller-manager because it changed 2026-03-20T08:37:00.566417927Z I0320 08:37:00.562996 1 apps.go:155] Deployment "openshift-route-controller-manager/route-controller-manager" changes: {"metadata":{"annotations":{"operator.openshift.io/spec-hash":"8358b5d11be75e9fdf7d2bec0d76cc38890eca25e3f44a66c39b333913831c1d"}},"spec":{"progressDeadlineSeconds":null,"revisionHistoryLimit":null,"template":{"metadata":{"annotations":{"configmaps/client-ca":"7402"}},"spec":{"containers":[{"args":["--config=/var/run/configmaps/config/config.yaml","-v=2"],"command":["route-controller-manager","start"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}}],"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b","imagePullPolicy":"IfNotPresent","livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30},"name":"route-controller-manager","ports":[{"containerPort":8443}],"readinessProbe":{"failureThreshold":10,"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"}},"resources":{"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]}},"terminationMessagePolicy":"FallbackToLogsOnError","volumeMounts":[{"mountPath":"/var/run/configmaps/config","name":"config"},{"mountPath":"/var/run/configmaps/client-ca","name":"client-ca"},{"mountPath":"/var/run/secrets/serving-cert","name":"serving-cert"}]}],"dnsPolicy":null,"restartPolicy":null,"schedulerName":null,"serviceAccount":null,"terminationGracePeriodSeconds":null,"volumes":[{"configMap":{"name":"config"},"name":"config"},{"configMap":{"name":"client-ca"},"name":"client-ca"},{"name":"serving-cert","secret":{"secretName":"serving-cert"}}]}}}} 2026-03-20T08:37:00.580385384Z W0320 08:37:00.580321 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-20T08:37:00.580978742Z I0320 08:37:00.580914 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentUpdated' Updated Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it changed 2026-03-20T08:37:00.602391877Z I0320 08:37:00.602330 1 status_controller.go:225] clusteroperator/openshift-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-20T08:36:20Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-20T08:36:25Z","message":"Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\nProgressing: deployment/route-controller-manager: observed generation is 3, desired generation is 4.\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1","reason":"_DesiredStateNotYetAchieved","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-20T08:36:25Z","message":"Available: no pods available on any node.","reason":"_NoPodsAvailable","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-20T08:36:25Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-20T08:37:00.612598344Z I0320 08:37:00.612526 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from "Progressing: deployment/controller-manager: observed generation is 2, desired generation is 3.\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas > 1\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3.\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas > 1" to "Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas > 1\nProgressing: deployment/route-controller-manager: observed generation is 3, desired generation is 4.\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas > 1" 2026-03-20T08:37:20.618241502Z I0320 08:37:20.618083 1 core.go:352] ConfigMap "openshift-controller-manager/config" changes: {"apiVersion":"v1","data":{"openshift-controller-manager.client-ca.configmap":"tv3Rtw=="},"kind":"ConfigMap","metadata":{"creationTimestamp":null,"managedFields":null,"resourceVersion":null,"uid":null}} 2026-03-20T08:37:20.618517091Z I0320 08:37:20.618457 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapUpdated' Updated ConfigMap/config -n openshift-controller-manager: 2026-03-20T08:37:20.618517091Z cause by changes in data.openshift-controller-manager.client-ca.configmap 2026-03-20T08:37:20.705421827Z I0320 08:37:20.705010 1 core.go:352] ConfigMap "openshift-route-controller-manager/config" changes: {"apiVersion":"v1","data":{"openshift-route-controller-manager.client-ca.configmap":"tv3Rtw=="},"kind":"ConfigMap","metadata":{"creationTimestamp":null,"managedFields":null,"resourceVersion":null,"uid":null}} 2026-03-20T08:37:20.705482759Z I0320 08:37:20.705446 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapUpdated' Updated ConfigMap/config -n openshift-route-controller-manager: 2026-03-20T08:37:20.705482759Z cause by changes in data.openshift-route-controller-manager.client-ca.configmap 2026-03-20T08:37:20.730044045Z I0320 08:37:20.728446 1 apps.go:155] Deployment "openshift-controller-manager/controller-manager" changes: {"metadata":{"annotations":{"operator.openshift.io/spec-hash":"927cd15443a1ef6ef593c68149daebabb9eabdec343e02995d463bc7335f37eb"}},"spec":{"progressDeadlineSeconds":null,"revisionHistoryLimit":null,"template":{"metadata":{"annotations":{"configmaps/config":"8420"}},"spec":{"containers":[{"args":["--config=/var/run/configmaps/config/config.yaml","-v=2"],"command":["openshift-controller-manager","start"],"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","imagePullPolicy":"IfNotPresent","livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30},"name":"controller-manager","ports":[{"containerPort":8443}],"readinessProbe":{"failureThreshold":10,"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"}},"resources":{"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]}},"terminationMessagePolicy":"FallbackToLogsOnError","volumeMounts":[{"mountPath":"/var/run/configmaps/config","name":"config"},{"mountPath":"/var/run/configmaps/client-ca","name":"client-ca"},{"mountPath":"/var/run/secrets/serving-cert","name":"serving-cert"},{"mountPath":"/etc/pki/ca-trust/extracted/pem","name":"proxy-ca-bundles"}]}],"dnsPolicy":null,"restartPolicy":null,"schedulerName":null,"serviceAccount":null,"terminationGracePeriodSeconds":null,"volumes":[{"configMap":{"name":"config"},"name":"config"},{"configMap":{"name":"client-ca"},"name":"client-ca"},{"name":"serving-cert","secret":{"secretName":"serving-cert"}},{"configMap":{"items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"name":"openshift-global-ca"},"name":"proxy-ca-bundles"}]}}}} 2026-03-20T08:37:20.743005484Z W0320 08:37:20.742599 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-20T08:37:20.743174948Z I0320 08:37:20.743118 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentUpdated' Updated Deployment.apps/controller-manager -n openshift-controller-manager because it changed 2026-03-20T08:37:20.751294315Z I0320 08:37:20.749741 1 apps.go:155] Deployment "openshift-route-controller-manager/route-controller-manager" changes: {"metadata":{"annotations":{"operator.openshift.io/spec-hash":"6af0fc6be21bec6f2c2285db6ef66874c565cf00abefbb2ed31b1a9fbf376965"}},"spec":{"progressDeadlineSeconds":null,"revisionHistoryLimit":null,"template":{"metadata":{"annotations":{"configmaps/config":"8428"}},"spec":{"containers":[{"args":["--config=/var/run/configmaps/config/config.yaml","-v=2"],"command":["route-controller-manager","start"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}}],"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b","imagePullPolicy":"IfNotPresent","livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30},"name":"route-controller-manager","ports":[{"containerPort":8443}],"readinessProbe":{"failureThreshold":10,"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"}},"resources":{"requests":{"cpu":"100m","memory":"100Mi"}},"securityContext":{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]}},"terminationMessagePolicy":"FallbackToLogsOnError","volumeMounts":[{"mountPath":"/var/run/configmaps/config","name":"config"},{"mountPath":"/var/run/configmaps/client-ca","name":"client-ca"},{"mountPath":"/var/run/secrets/serving-cert","name":"serving-cert"}]}],"dnsPolicy":null,"restartPolicy":null,"schedulerName":null,"serviceAccount":null,"terminationGracePeriodSeconds":null,"volumes":[{"configMap":{"name":"config"},"name":"config"},{"configMap":{"name":"client-ca"},"name":"client-ca"},{"name":"serving-cert","secret":{"secretName":"serving-cert"}}]}}}} 2026-03-20T08:37:20.770268649Z W0320 08:37:20.769014 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-20T08:37:20.770268649Z I0320 08:37:20.769588 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentUpdated' Updated Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it changed 2026-03-20T08:37:20.799365928Z I0320 08:37:20.797289 1 status_controller.go:225] clusteroperator/openshift-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-20T08:36:20Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-20T08:36:25Z","message":"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\nProgressing: deployment/route-controller-manager: observed generation is 4, desired generation is 5.\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1","reason":"_DesiredStateNotYetAchieved","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-20T08:36:25Z","message":"Available: no pods available on any node.","reason":"_NoPodsAvailable","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-20T08:36:25Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-20T08:37:20.835091871Z I0320 08:37:20.826487 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-controller-manager-operator", Name:"openshift-controller-manager-operator", UID:"255cf078-fbcd-423f-bbb8-27b20fdc79ca", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from "Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas > 1\nProgressing: deployment/route-controller-manager: observed generation is 3, desired generation is 4.\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas > 1" to "Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas > 1\nProgressing: deployment/route-controller-manager: observed generation is 4, desired generation is 5.\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas > 1" 2026-03-20T08:37:39.655535131Z I0320 08:37:39.655398 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="7264c65e1073b42d3c996d8114caf3fdb4eaaec1165bcf2d5379fc32f915b12e") 2026-03-20T08:37:39.655535131Z W0320 08:37:39.655465 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.key was created 2026-03-20T08:37:39.655680335Z I0320 08:37:39.655646 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="a1de63fe9420ae98e3dfb7c5cb1266a0cc1a78657441d801acf87d499ec657bb") 2026-03-20T08:37:39.655718306Z I0320 08:37:39.655676 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-20T08:37:39.655757077Z I0320 08:37:39.655739 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-20T08:37:39.655792548Z I0320 08:37:39.655753 1 base_controller.go:181] Shutting down OpenshiftControllerManagerStaticResources-StaticResources ... 2026-03-20T08:37:39.655804369Z I0320 08:37:39.655795 1 base_controller.go:181] Shutting down UserCAObservationController ... 2026-03-20T08:37:39.655833609Z I0320 08:37:39.655817 1 base_controller.go:181] Shutting down openshift-controller-manager ... 2026-03-20T08:37:39.655845180Z I0320 08:37:39.655838 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-20T08:37:39.655919492Z I0320 08:37:39.655856 1 operator.go:151] Shutting down OpenShiftControllerManagerOperator 2026-03-20T08:37:39.655919492Z I0320 08:37:39.655895 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-20T08:37:39.655931002Z I0320 08:37:39.655920 1 base_controller.go:123] Shutting down worker of UserCAObservationController controller ... 2026-03-20T08:37:39.655940453Z I0320 08:37:39.655929 1 base_controller.go:113] All UserCAObservationController workers have been terminated 2026-03-20T08:37:39.655952113Z I0320 08:37:39.655943 1 base_controller.go:123] Shutting down worker of openshift-controller-manager controller ... 2026-03-20T08:37:39.655961373Z I0320 08:37:39.655952 1 base_controller.go:113] All openshift-controller-manager workers have been terminated 2026-03-20T08:37:39.656005384Z I0320 08:37:39.655965 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-20T08:37:39.656005384Z I0320 08:37:39.655972 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-20T08:37:39.656005384Z I0320 08:37:39.655939 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-20T08:37:39.656017875Z I0320 08:37:39.656005 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-20T08:37:39.656027445Z I0320 08:37:39.656014 1 base_controller.go:181] Shutting down ImagePullSecretCleanupController ... 2026-03-20T08:37:39.656048856Z I0320 08:37:39.656033 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-20T08:37:39.656048856Z I0320 08:37:39.656036 1 base_controller.go:123] Shutting down worker of OpenshiftControllerManagerStaticResources-StaticResources controller ... 2026-03-20T08:37:39.656066036Z I0320 08:37:39.656053 1 base_controller.go:113] All OpenshiftControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-20T08:37:39.656143329Z I0320 08:37:39.656109 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-20T08:37:39.656143329Z I0320 08:37:39.656113 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-20T08:37:39.656143329Z I0320 08:37:39.656128 1 base_controller.go:181] Shutting down StatusSyncer_openshift-controller-manager ... 2026-03-20T08:37:39.656143329Z I0320 08:37:39.656136 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-20T08:37:39.656175819Z I0320 08:37:39.656154 1 base_controller.go:123] Shutting down worker of ImagePullSecretCleanupController controller ... 2026-03-20T08:37:39.656175819Z I0320 08:37:39.656171 1 base_controller.go:113] All ImagePullSecretCleanupController workers have been terminated 2026-03-20T08:37:39.656273982Z W0320 08:37:39.656202 1 builder.go:136] graceful termination failed, controllers failed with error: stopped 2026-03-20T08:37:39.656273982Z I0320 08:37:39.656236 1 base_controller.go:123] Shutting down worker of StatusSyncer_openshift-controller-manager controller ... 2026-03-20T08:37:39.656273982Z I0320 08:37:39.656161 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController openshift-controller-manager-operator-8c94f4649-p7pt6.json0000640000000000000000000002042215157203665033317 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-8c94f4649-p7pt6","generateName":"openshift-controller-manager-operator-8c94f4649-","namespace":"openshift-controller-manager-operator","uid":"68252533-bd64-4fc5-838a-cc350cbe77f0","resourceVersion":"9040","creationTimestamp":"2026-03-20T08:34:24Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"8c94f4649"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.23/23\"],\"mac_address\":\"0a:58:0a:80:00:17\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.23/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.23\"\n ],\n \"mac\": \"0a:58:0a:80:00:17\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-8c94f4649","uid":"1df4bc73-6b28-494a-b02d-2924902bc9be","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-75r7k","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-75r7k","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c14,c4"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:15Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:06Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:37:41Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:37:41Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.23","podIPs":[{"ip":"10.128.0.23"}],"startTime":"2026-03-20T08:36:06Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-03-20T08:37:40Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"oller.go:123] Shutting down worker of LoggingSyncer controller ...\nI0320 08:37:39.655972 1 base_controller.go:113] All LoggingSyncer workers have been terminated\nI0320 08:37:39.655939 1 tlsconfig.go:258] \"Shutting down DynamicServingCertificateController\"\nI0320 08:37:39.656005 1 secure_serving.go:258] Stopped listening on [::]:8443\nI0320 08:37:39.656014 1 base_controller.go:181] Shutting down ImagePullSecretCleanupController ...\nI0320 08:37:39.656033 1 genericapiserver.go:598] \"[graceful-termination] shutdown event\" name=\"HTTPServerStoppedListening\"\nI0320 08:37:39.656036 1 base_controller.go:123] Shutting down worker of OpenshiftControllerManagerStaticResources-StaticResources controller ...\nI0320 08:37:39.656053 1 base_controller.go:113] All OpenshiftControllerManagerStaticResources-StaticResources workers have been terminated\nI0320 08:37:39.656109 1 base_controller.go:181] Shutting down ConfigObserver ...\nI0320 08:37:39.656113 1 configmap_cafile_content.go:226] \"Shutting down controller\" name=\"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\"\nI0320 08:37:39.656128 1 base_controller.go:181] Shutting down StatusSyncer_openshift-controller-manager ...\nI0320 08:37:39.656136 1 configmap_cafile_content.go:226] \"Shutting down controller\" name=\"client-ca::kube-system::extension-apiserver-authentication::client-ca-file\"\nI0320 08:37:39.656154 1 base_controller.go:123] Shutting down worker of ImagePullSecretCleanupController controller ...\nI0320 08:37:39.656171 1 base_controller.go:113] All ImagePullSecretCleanupController workers have been terminated\nW0320 08:37:39.656202 1 builder.go:136] graceful termination failed, controllers failed with error: stopped\nI0320 08:37:39.656236 1 base_controller.go:123] Shutting down worker of StatusSyncer_openshift-controller-manager controller ...\nI0320 08:37:39.656161 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController\n","startedAt":"2026-03-20T08:36:19Z","finishedAt":"2026-03-20T08:37:39Z","containerID":"cri-o://e3f8332f8ebf3d1a4f060a0c3657a0fbf7dd52dab57065dbe98fe23495c66678"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","containerID":"cri-o://e90b46b2a24eed1acbde07d446b8c7de8acf8cbdfe00eeb63977c91e3cae9f34","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-75r7k","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-brhw4/etcd-operator_current.log0000640000000000000000000001055315157203665031303 0ustar00000000000000002026-03-20T08:38:47.269659223Z I0320 08:38:47.266864 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-03-20T08:38:47.269659223Z I0320 08:38:47.267376 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-20T08:38:47.269659223Z I0320 08:38:47.267414 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-20T08:38:47.269659223Z I0320 08:38:47.267445 1 observer_polling.go:159] Starting file observer 2026-03-20T08:38:47.269659223Z I0320 08:38:47.267852 1 observer_polling.go:159] Starting file observer 2026-03-20T08:38:49.671478276Z I0320 08:38:49.671394 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602261953.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934 2026-03-20T08:38:50.817298229Z I0320 08:38:50.815988 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-20T08:38:50.817298229Z W0320 08:38:50.816038 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-20T08:38:50.817298229Z W0320 08:38:50.816043 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-20T08:38:50.817298229Z W0320 08:38:50.816047 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-20T08:38:50.817298229Z W0320 08:38:50.816051 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-20T08:38:50.817298229Z W0320 08:38:50.816054 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-20T08:38:50.817298229Z W0320 08:38:50.816057 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-20T08:38:50.827948320Z I0320 08:38:50.827739 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-20T08:38:50.828061393Z I0320 08:38:50.828048 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-20T08:38:50.828111314Z I0320 08:38:50.828102 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-20T08:38:50.828176866Z I0320 08:38:50.828155 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-20T08:38:50.828422213Z I0320 08:38:50.828407 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-20T08:38:50.828590258Z I0320 08:38:50.828566 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-20T08:38:50.828619029Z I0320 08:38:50.828610 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-20T08:38:50.828652270Z I0320 08:38:50.828642 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-20T08:38:50.828675411Z I0320 08:38:50.828667 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-20T08:38:50.929595558Z I0320 08:38:50.929532 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-20T08:38:50.929698021Z I0320 08:38:50.929531 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-20T08:38:50.929974279Z I0320 08:38:50.929563 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-20T08:38:53.364858728Z I0320 08:38:53.362357 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-20T08:38:53.364858728Z I0320 08:38:53.362862 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-brhw4/etcd-operator_previous.log0000640000000000000000000003616115157203665031500 0ustar00000000000000002026-03-20T08:37:51.349676557Z I0320 08:37:51.344179 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344207 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344213 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344220 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344232 1 base_controller.go:181] Shutting down EtcdStaticResources-StaticResources ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344233 1 base_controller.go:123] Shutting down worker of etcd-operator-UnsupportedConfigOverrides controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344264 1 base_controller.go:113] All etcd-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344270 1 controller_manager.go:54] etcd-operator-UnsupportedConfigOverrides controller terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344286 1 base_controller.go:123] Shutting down worker of ScriptController controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344287 1 base_controller.go:123] Shutting down worker of MachineDeletionHooksController controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344296 1 base_controller.go:113] All ScriptController workers have been terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344312 1 base_controller.go:123] Shutting down worker of StatusSyncer_etcd controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344323 1 base_controller.go:113] All StatusSyncer_etcd workers have been terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344323 1 base_controller.go:113] All MachineDeletionHooksController workers have been terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344354 1 base_controller.go:123] Shutting down worker of etcd-UnsupportedConfigOverrides controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344363 1 base_controller.go:113] All etcd-UnsupportedConfigOverrides workers have been terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344376 1 base_controller.go:123] Shutting down worker of etcd-Node controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344386 1 base_controller.go:113] All etcd-Node workers have been terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344394 1 controller_manager.go:54] etcd-Node controller terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344196 1 base_controller.go:181] Shutting down etcd-StaticPodState ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344417 1 base_controller.go:123] Shutting down worker of etcd controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344431 1 base_controller.go:113] All etcd workers have been terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344451 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344486 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344564 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344609 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344620 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344626 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344644 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344654 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344659 1 controller_manager.go:54] RevisionController controller terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344672 1 base_controller.go:123] Shutting down worker of DefragController controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344684 1 base_controller.go:113] All DefragController workers have been terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344722 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344815 1 base_controller.go:123] Shutting down worker of etcd-StaticPodState controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344839 1 base_controller.go:113] All etcd-StaticPodState workers have been terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344852 1 controller_manager.go:54] etcd-StaticPodState controller terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344862 1 base_controller.go:181] Shutting down FSyncController ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344883 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344870 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344908 1 base_controller.go:113] All Installer workers have been terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344917 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344932 1 controller_manager.go:54] GuardController controller terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344932 1 base_controller.go:123] Shutting down worker of etcd-InstallerState controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344918 1 controller_manager.go:54] Installer controller terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344952 1 base_controller.go:113] All etcd-InstallerState workers have been terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344959 1 base_controller.go:181] Shutting down EtcdMembersController ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344962 1 controller_manager.go:54] etcd-InstallerState controller terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.344985 1 base_controller.go:181] Shutting down EtcdCertCleanerController ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.345006 1 base_controller.go:123] Shutting down worker of EtcdCertCleanerController controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.345015 1 base_controller.go:113] All EtcdCertCleanerController workers have been terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.345025 1 base_controller.go:123] Shutting down worker of FSyncController controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.345035 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-20T08:37:51.349676557Z I0320 08:37:51.345050 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.345058 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-20T08:37:51.349676557Z I0320 08:37:51.345037 1 base_controller.go:113] All FSyncController workers have been terminated 2026-03-20T08:37:51.349764309Z E0320 08:37:51.345099 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-20T08:37:51.349764309Z I0320 08:37:51.345243 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-20T08:37:51.349764309Z I0320 08:37:51.345350 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-20T08:37:51.349764309Z I0320 08:37:51.345378 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-20T08:37:51.349764309Z I0320 08:37:51.345386 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-20T08:37:51.349764309Z I0320 08:37:51.345433 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-20T08:37:51.349764309Z I0320 08:37:51.345447 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-20T08:37:51.349764309Z I0320 08:37:51.345473 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-20T08:37:51.349764309Z I0320 08:37:51.345476 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-20T08:37:51.349764309Z I0320 08:37:51.345488 1 builder.go:335] server exited 2026-03-20T08:37:51.349764309Z I0320 08:37:51.345514 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-20T08:37:51.349764309Z I0320 08:37:51.345540 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-20T08:37:51.349764309Z E0320 08:37:51.346062 1 base_controller.go:279] "Unhandled Error" err="EtcdStaticResources-StaticResources reconciliation failed: [\"etcd/backups-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/serviceaccounts/etcd-backup-sa\": context canceled, \"etcd/backups-cr.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"EtcdStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-20T08:37:51.349764309Z I0320 08:37:51.346145 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-20T08:37:51.349764309Z I0320 08:37:51.346200 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-20T08:37:51.349764309Z I0320 08:37:51.347335 1 base_controller.go:123] Shutting down worker of EtcdStaticResources-StaticResources controller ... 2026-03-20T08:37:51.349764309Z I0320 08:37:51.347359 1 base_controller.go:113] All EtcdStaticResources-StaticResources workers have been terminated 2026-03-20T08:37:51.557097680Z I0320 08:37:51.557005 1 etcdcli_pool.go:70] creating a new cached client 2026-03-20T08:37:51.573908191Z I0320 08:37:51.572332 1 etcdcli_pool.go:70] creating a new cached client 2026-03-20T08:37:52.141379671Z I0320 08:37:52.141282 1 etcdcli_pool.go:70] creating a new cached client 2026-03-20T08:37:53.778438494Z I0320 08:37:53.778307 1 etcdcli_pool.go:70] creating a new cached client 2026-03-20T08:37:54.094620131Z I0320 08:37:54.094518 1 etcdcli_pool.go:70] creating a new cached client 2026-03-20T08:37:56.343348376Z I0320 08:37:56.343202 1 observer_polling.go:162] Shutting down file observer 2026-03-20T08:38:06.559107701Z W0320 08:38:06.558975 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-20T08:38:06.559107701Z E0320 08:38:06.559051 1 base_controller.go:279] "Unhandled Error" err="BootstrapTeardownController reconciliation failed: error while canRemoveEtcdBootstrap: giving up getting a cached client after 3 tries" 2026-03-20T08:38:06.560355217Z I0320 08:38:06.560270 1 base_controller.go:123] Shutting down worker of BootstrapTeardownController controller ... 2026-03-20T08:38:06.560355217Z I0320 08:38:06.560305 1 base_controller.go:113] All BootstrapTeardownController workers have been terminated 2026-03-20T08:38:06.573596404Z W0320 08:38:06.573501 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-20T08:38:06.574893391Z E0320 08:38:06.574831 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberController reconciliation failed: could not get list of unhealthy members: giving up getting a cached client after 3 tries" 2026-03-20T08:38:06.576223550Z I0320 08:38:06.576118 1 base_controller.go:123] Shutting down worker of ClusterMemberController controller ... 2026-03-20T08:38:06.576249811Z I0320 08:38:06.576221 1 base_controller.go:113] All ClusterMemberController workers have been terminated 2026-03-20T08:38:07.143227227Z W0320 08:38:07.143082 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-20T08:38:08.779830798Z W0320 08:38:08.779717 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-20T08:38:08.781381473Z E0320 08:38:08.781321 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberRemovalController reconciliation failed: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries" 2026-03-20T08:38:08.782754863Z I0320 08:38:08.782670 1 base_controller.go:123] Shutting down worker of ClusterMemberRemovalController controller ... 2026-03-20T08:38:08.782797194Z I0320 08:38:08.782766 1 base_controller.go:113] All ClusterMemberRemovalController workers have been terminated 2026-03-20T08:38:09.096823818Z W0320 08:38:09.096697 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-20T08:38:09.097429576Z E0320 08:38:09.097358 1 base_controller.go:279] "Unhandled Error" err="EtcdEndpointsController reconciliation failed: failed to get member list: giving up getting a cached client after 3 tries" 2026-03-20T08:38:09.098809606Z I0320 08:38:09.098643 1 base_controller.go:123] Shutting down worker of EtcdEndpointsController controller ... 2026-03-20T08:38:09.098809606Z I0320 08:38:09.098706 1 base_controller.go:113] All EtcdEndpointsController workers have been terminated 2026-03-20T08:38:11.144037580Z I0320 08:38:11.143928 1 etcdcli_pool.go:70] creating a new cached client 2026-03-20T08:38:25.350671837Z E0320 08:38:25.350548 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-20T08:38:25.350671837Z W0320 08:38:25.350616 1 leaderelection.go:84] leader election lost config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-brhw4.json0000640000000000000000000001576315157203665024225 0ustar0000000000000000{"metadata":{"name":"etcd-operator-8544cbcf9c-brhw4","generateName":"etcd-operator-8544cbcf9c-","namespace":"openshift-etcd-operator","uid":"f046860d-2d54-4746-8ba2-f8e90fa55e38","resourceVersion":"9073","creationTimestamp":"2026-03-20T08:34:25Z","labels":{"app":"etcd-operator","pod-template-hash":"8544cbcf9c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.28/23\"],\"mac_address\":\"0a:58:0a:80:00:1c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.28/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.28\"\n ],\n \"mac\": \"0a:58:0a:80:00:1c\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-8544cbcf9c","uid":"b1a2ca58-17ea-4bcf-b8e7-a20bf71026e6","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-xhkh7","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.35"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-xhkh7","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:15Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:07Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:38:47Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:38:47Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.28","podIPs":[{"ip":"10.128.0.28"}],"startTime":"2026-03-20T08:36:07Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-03-20T08:38:47Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-20T08:36:31Z","finishedAt":"2026-03-20T08:38:25Z","containerID":"cri-o://0bd5b879aadefbf9a44c6c6dcf866736c73041c10aa61588b2570b45b21eb4d2"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","containerID":"cri-o://c3742feb1f4aa394282e45f9e7e1ad5a78209b23e0c120a4f3b31f9fa95097bc","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-xhkh7","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000002744515157203665034142 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-779f85678d-lrzfz2026-03-20T08:37:02.909899565Z W0320 08:37:02.905525 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-20T08:37:02.909899565Z I0320 08:37:02.906261 1 crypto.go:601] Generating new CA for check-endpoints-signer@1773995822 cert, and key in /tmp/serving-cert-357124689/serving-signer.crt, /tmp/serving-cert-357124689/serving-signer.key 2026-03-20T08:37:03.178374140Z I0320 08:37:03.177753 1 observer_polling.go:159] Starting file observer 2026-03-20T08:37:03.214216626Z I0320 08:37:03.214144 1 builder.go:304] check-endpoints version 4.18.0-202602261953.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-20T08:37:03.215208955Z I0320 08:37:03.215170 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-357124689/tls.crt::/tmp/serving-cert-357124689/tls.key" 2026-03-20T08:37:03.485910995Z I0320 08:37:03.485131 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-20T08:37:03.491309002Z I0320 08:37:03.487992 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-20T08:37:03.491309002Z I0320 08:37:03.488017 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-20T08:37:03.491309002Z I0320 08:37:03.488039 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-20T08:37:03.491309002Z I0320 08:37:03.488044 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-20T08:37:03.516611031Z I0320 08:37:03.516002 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-20T08:37:03.516611031Z W0320 08:37:03.516053 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-20T08:37:03.516611031Z W0320 08:37:03.516059 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-20T08:37:03.516611031Z W0320 08:37:03.516069 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-20T08:37:03.516611031Z W0320 08:37:03.516072 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-20T08:37:03.516611031Z W0320 08:37:03.516075 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-20T08:37:03.516611031Z W0320 08:37:03.516082 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-20T08:37:03.516663932Z I0320 08:37:03.516590 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-20T08:37:03.525120289Z I0320 08:37:03.525006 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-20T08:37:03.525120289Z I0320 08:37:03.525092 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-357124689/tls.crt::/tmp/serving-cert-357124689/tls.key" 2026-03-20T08:37:03.525120289Z I0320 08:37:03.525111 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-20T08:37:03.525222732Z I0320 08:37:03.525194 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-20T08:37:03.525222732Z I0320 08:37:03.525218 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-20T08:37:03.525292054Z I0320 08:37:03.525266 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-20T08:37:03.525292054Z I0320 08:37:03.525285 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-20T08:37:03.525322645Z I0320 08:37:03.525059 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-357124689/tls.crt::/tmp/serving-cert-357124689/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773995822\" (2026-03-20 08:37:02 +0000 UTC to 2026-04-19 08:37:03 +0000 UTC (now=2026-03-20 08:37:03.525008956 +0000 UTC))" 2026-03-20T08:37:03.526088037Z I0320 08:37:03.526033 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773995823\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773995823\" (2026-03-20 07:37:03 +0000 UTC to 2027-03-20 07:37:03 +0000 UTC (now=2026-03-20 08:37:03.525908582 +0000 UTC))" 2026-03-20T08:37:03.526115598Z I0320 08:37:03.526098 1 secure_serving.go:213] Serving securely on [::]:17698 2026-03-20T08:37:03.526394236Z I0320 08:37:03.526354 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-20T08:37:03.531177676Z I0320 08:37:03.526722 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-20T08:37:03.531177676Z I0320 08:37:03.526748 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-20T08:37:03.531177676Z I0320 08:37:03.528034 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-20T08:37:03.536253354Z I0320 08:37:03.536212 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:37:03.536563353Z I0320 08:37:03.536513 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:37:03.537619114Z I0320 08:37:03.537073 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:37:03.538398387Z I0320 08:37:03.538376 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-03-20T08:37:03.626082116Z I0320 08:37:03.625997 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-20T08:37:03.626082116Z I0320 08:37:03.626067 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-20T08:37:03.626220340Z I0320 08:37:03.626179 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-20T08:37:03.626427156Z I0320 08:37:03.626395 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-20 08:25:32 +0000 UTC to 2026-03-21 08:25:32 +0000 UTC (now=2026-03-20 08:37:03.626359964 +0000 UTC))" 2026-03-20T08:37:03.626613541Z I0320 08:37:03.626582 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-357124689/tls.crt::/tmp/serving-cert-357124689/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773995822\" (2026-03-20 08:37:02 +0000 UTC to 2026-04-19 08:37:03 +0000 UTC (now=2026-03-20 08:37:03.62656087 +0000 UTC))" 2026-03-20T08:37:03.626739705Z I0320 08:37:03.626720 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773995823\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773995823\" (2026-03-20 07:37:03 +0000 UTC to 2027-03-20 07:37:03 +0000 UTC (now=2026-03-20 08:37:03.626705354 +0000 UTC))" 2026-03-20T08:37:03.629237308Z I0320 08:37:03.629178 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-20 08:18:48 +0000 UTC to 2036-03-17 08:18:48 +0000 UTC (now=2026-03-20 08:37:03.629103764 +0000 UTC))" 2026-03-20T08:37:03.629335380Z I0320 08:37:03.629320 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-20 08:25:35 +0000 UTC to 2026-03-21 08:25:35 +0000 UTC (now=2026-03-20 08:37:03.629292139 +0000 UTC))" 2026-03-20T08:37:03.629399912Z I0320 08:37:03.629386 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-20 08:25:35 +0000 UTC to 2027-03-20 08:25:35 +0000 UTC (now=2026-03-20 08:37:03.629369261 +0000 UTC))" 2026-03-20T08:37:03.629455934Z I0320 08:37:03.629441 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-20 08:25:35 +0000 UTC to 2027-03-20 08:25:35 +0000 UTC (now=2026-03-20 08:37:03.629423133 +0000 UTC))" 2026-03-20T08:37:03.629514136Z I0320 08:37:03.629498 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-20 08:25:32 +0000 UTC to 2036-03-17 08:25:32 +0000 UTC (now=2026-03-20 08:37:03.629474905 +0000 UTC))" 2026-03-20T08:37:03.629576797Z I0320 08:37:03.629558 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-20 08:25:32 +0000 UTC to 2026-03-21 08:25:32 +0000 UTC (now=2026-03-20 08:37:03.629538636 +0000 UTC))" 2026-03-20T08:37:03.629950658Z I0320 08:37:03.629925 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-357124689/tls.crt::/tmp/serving-cert-357124689/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773995822\" (2026-03-20 08:37:02 +0000 UTC to 2026-04-19 08:37:03 +0000 UTC (now=2026-03-20 08:37:03.629900287 +0000 UTC))" 2026-03-20T08:37:03.630165365Z I0320 08:37:03.630149 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773995823\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773995823\" (2026-03-20 07:37:03 +0000 UTC to 2027-03-20 07:37:03 +0000 UTC (now=2026-03-20 08:37:03.630128934 +0000 UTC))" 2026-03-20T08:37:04.011436041Z I0320 08:37:04.011314 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:37:04.040028676Z I0320 08:37:04.039933 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-03-20T08:37:04.040105018Z I0320 08:37:04.040089 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-779f85678d-lrzfz/openshift-apiserver_current.log0000640000000000000000000011723015157203665031135 0ustar00000000000000002026-03-20T08:38:48.381475249Z E0320 08:38:48.381426 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:48.427829192Z E0320 08:38:48.427756 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:48.428840922Z E0320 08:38:48.427884 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:48.428840922Z E0320 08:38:48.428120 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:48.428840922Z E0320 08:38:48.428289 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:48.428840922Z E0320 08:38:48.428334 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:48.719976728Z E0320 08:38:48.719895 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:48.719976728Z E0320 08:38:48.719944 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:48.719976728Z E0320 08:38:48.719944 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:48.720040890Z E0320 08:38:48.719896 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:48.720176264Z E0320 08:38:48.720142 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:49.355114663Z E0320 08:38:49.354044 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:49.355114663Z E0320 08:38:49.354105 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:49.355114663Z E0320 08:38:49.354133 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:49.355114663Z E0320 08:38:49.354163 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:49.355114663Z E0320 08:38:49.354237 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:50.299141312Z E0320 08:38:50.299075 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:50.299300456Z E0320 08:38:50.299080 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:50.301749298Z E0320 08:38:50.299339 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:50.301749298Z E0320 08:38:50.299160 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:50.301749298Z E0320 08:38:50.299615 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:51.304414675Z E0320 08:38:51.304346 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:51.304565739Z E0320 08:38:51.304527 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:51.305036143Z E0320 08:38:51.305004 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:51.305269690Z E0320 08:38:51.305231 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:51.305334452Z E0320 08:38:51.305297 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.487893398Z E0320 08:39:00.487814 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.487946539Z E0320 08:39:00.487814 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.494601854Z E0320 08:39:00.493330 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.494601854Z E0320 08:39:00.493902 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.494601854Z E0320 08:39:00.494137 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.494601854Z E0320 08:39:00.494380 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.494643355Z E0320 08:39:00.494619 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.497600311Z E0320 08:39:00.497564 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.503426071Z E0320 08:39:00.500173 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.506465860Z E0320 08:39:00.506423 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.506519881Z E0320 08:39:00.506500 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.506787139Z E0320 08:39:00.506748 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.507005936Z E0320 08:39:00.506973 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.508823299Z E0320 08:39:00.507253 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.508823299Z E0320 08:39:00.507483 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.508823299Z E0320 08:39:00.507666 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.508823299Z E0320 08:39:00.507704 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.508823299Z E0320 08:39:00.507769 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.508823299Z E0320 08:39:00.507815 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.508823299Z E0320 08:39:00.507874 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.508823299Z E0320 08:39:00.507939 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.508823299Z E0320 08:39:00.507946 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.508823299Z E0320 08:39:00.507962 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.508823299Z E0320 08:39:00.508040 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.508823299Z E0320 08:39:00.508071 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.508823299Z E0320 08:39:00.508117 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.508823299Z E0320 08:39:00.507876 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.508823299Z E0320 08:39:00.508145 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.508823299Z E0320 08:39:00.507710 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.508823299Z E0320 08:39:00.507874 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.511171467Z E0320 08:39:00.511129 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.511531608Z E0320 08:39:00.511492 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.511793295Z E0320 08:39:00.511765 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.511997321Z E0320 08:39:00.511943 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.512041643Z E0320 08:39:00.512027 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.512105094Z E0320 08:39:00.512078 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.512417754Z E0320 08:39:00.512384 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.514717041Z E0320 08:39:00.514696 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.514951527Z E0320 08:39:00.514926 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.520355675Z E0320 08:39:00.520329 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.520519850Z E0320 08:39:00.520504 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.520576452Z E0320 08:39:00.520551 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.520645364Z E0320 08:39:00.520631 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.520749757Z E0320 08:39:00.520733 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.520910421Z E0320 08:39:00.520885 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.520953653Z E0320 08:39:00.520888 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.521122348Z E0320 08:39:00.521089 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.521251161Z E0320 08:39:00.521234 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.521346354Z E0320 08:39:00.521321 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.521521899Z E0320 08:39:00.521503 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.521590751Z E0320 08:39:00.521569 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.525151135Z E0320 08:39:00.525077 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.525375522Z E0320 08:39:00.525328 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.525458704Z E0320 08:39:00.525422 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.534081406Z E0320 08:39:00.534025 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.544494550Z E0320 08:39:00.544214 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.545059986Z E0320 08:39:00.544952 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.553230425Z E0320 08:39:00.552600 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.554223504Z E0320 08:39:00.553269 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.563579657Z E0320 08:39:00.563520 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.570486208Z E0320 08:39:00.570397 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.576707210Z E0320 08:39:00.576635 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.584748794Z E0320 08:39:00.584561 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.594024265Z E0320 08:39:00.593934 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.594096287Z E0320 08:39:00.594070 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.599049822Z E0320 08:39:00.599002 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.599049822Z E0320 08:39:00.599015 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.600020740Z E0320 08:39:00.599991 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.605621443Z E0320 08:39:00.605556 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.741010144Z E0320 08:39:00.738105 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.741010144Z E0320 08:39:00.738631 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.741010144Z E0320 08:39:00.738881 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.741010144Z E0320 08:39:00.739076 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.741010144Z E0320 08:39:00.739309 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000001001315157203665040057 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-d65958b8-th2vj2026-03-20T08:38:47.165879305Z I0320 08:38:47.164345 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-20T08:38:47.165879305Z I0320 08:38:47.164509 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-20T08:38:47.170293704Z I0320 08:38:47.170159 1 observer_polling.go:159] Starting file observer 2026-03-20T08:38:49.670642281Z I0320 08:38:49.670563 1 builder.go:304] openshift-apiserver-operator version - 2026-03-20T08:38:50.800430456Z I0320 08:38:50.798336 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-20T08:38:50.800430456Z W0320 08:38:50.798388 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-20T08:38:50.800430456Z W0320 08:38:50.798395 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-20T08:38:50.800430456Z W0320 08:38:50.798403 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-20T08:38:50.800430456Z W0320 08:38:50.798421 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-20T08:38:50.800430456Z W0320 08:38:50.798425 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-20T08:38:50.800430456Z W0320 08:38:50.798429 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-20T08:38:50.814346562Z I0320 08:38:50.811311 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-20T08:38:50.814346562Z I0320 08:38:50.811376 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-20T08:38:50.814346562Z I0320 08:38:50.811403 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-20T08:38:50.814346562Z I0320 08:38:50.811449 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-20T08:38:50.814346562Z I0320 08:38:50.811571 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-20T08:38:50.814346562Z I0320 08:38:50.811686 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-20T08:38:50.814346562Z I0320 08:38:50.811692 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-20T08:38:50.814346562Z I0320 08:38:50.811703 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-20T08:38:50.814346562Z I0320 08:38:50.811709 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-20T08:38:50.912319964Z I0320 08:38:50.912214 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-20T08:38:50.912319964Z I0320 08:38:50.912264 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-20T08:38:50.912371045Z I0320 08:38:50.912304 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-20T08:38:53.365938280Z I0320 08:38:53.365860 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-20T08:38:53.366454895Z I0320 08:38:53.366301 1 leaderelection.go:254] attempting to acquire leader lease openshift-apiserver-operator/openshift-apiserver-operator-lock... openshift-apiserver-operator_previous.log0000640000000000000000000004152415157203665040264 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-d65958b8-th2vj2026-03-20T08:37:30.410789566Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/authorization.openshift.io/v1: 401 2026-03-20T08:37:30.410789566Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/build.openshift.io/v1: 401 2026-03-20T08:37:30.410789566Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/image.openshift.io/v1: 401 2026-03-20T08:37:30.410789566Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/project.openshift.io/v1: 401 2026-03-20T08:37:30.410789566Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/quota.openshift.io/v1: 401 2026-03-20T08:37:30.410789566Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/route.openshift.io/v1: 401 2026-03-20T08:37:30.410789566Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/security.openshift.io/v1: 401 2026-03-20T08:37:30.410789566Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/template.openshift.io/v1: 401 2026-03-20T08:37:30.410789566Z > 2026-03-20T08:37:31.822436641Z I0320 08:37:31.821937 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-20T08:37:33.817200544Z E0320 08:37:33.817094 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-20T08:37:33.817200544Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/apps.openshift.io/v1: 401 2026-03-20T08:37:33.817200544Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/authorization.openshift.io/v1: 401 2026-03-20T08:37:33.817200544Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/build.openshift.io/v1: 401 2026-03-20T08:37:33.817200544Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/image.openshift.io/v1: 401 2026-03-20T08:37:33.817200544Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/project.openshift.io/v1: 401 2026-03-20T08:37:33.817200544Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/quota.openshift.io/v1: 401 2026-03-20T08:37:33.817200544Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/route.openshift.io/v1: 401 2026-03-20T08:37:33.817200544Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/security.openshift.io/v1: 401 2026-03-20T08:37:33.817200544Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/template.openshift.io/v1: 401 2026-03-20T08:37:33.817200544Z > 2026-03-20T08:37:41.439013668Z I0320 08:37:41.438930 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="e15abbb0b3f4dff2ceab428c70e9188a5292bfaf8a4b0e9eda1d7593b102fa96") 2026-03-20T08:37:41.439013668Z W0320 08:37:41.438996 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-20T08:37:41.439061440Z I0320 08:37:41.439052 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="4890c8e66481e17f5969373b510a8ab5545d1440daa08478a633cc882fe769bc") 2026-03-20T08:37:41.439253245Z I0320 08:37:41.439202 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-20T08:37:41.439313157Z I0320 08:37:41.439289 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-20T08:37:41.439454551Z I0320 08:37:41.439428 1 base_controller.go:181] Shutting down NamespaceFinalizerController_openshift-apiserver ... 2026-03-20T08:37:41.439486262Z I0320 08:37:41.439465 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-20T08:37:41.439496732Z I0320 08:37:41.439483 1 base_controller.go:181] Shutting down StatusSyncer_openshift-apiserver ... 2026-03-20T08:37:41.439496732Z I0320 08:37:41.439490 1 base_controller.go:159] All StatusSyncer_openshift-apiserver post start hooks have been terminated 2026-03-20T08:37:41.439523713Z I0320 08:37:41.439504 1 base_controller.go:181] Shutting down APIServerStaticResources-StaticResources ... 2026-03-20T08:37:41.439533773Z I0320 08:37:41.439522 1 base_controller.go:181] Shutting down openshift-apiserver-RemoveStaleConditions ... 2026-03-20T08:37:41.439543404Z I0320 08:37:41.439536 1 base_controller.go:181] Shutting down openshift-apiserver-UnsupportedConfigOverrides ... 2026-03-20T08:37:41.439748650Z I0320 08:37:41.439722 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-20T08:37:41.441566113Z I0320 08:37:41.441527 1 base_controller.go:123] Shutting down worker of openshift-apiserver-RemoveStaleConditions controller ... 2026-03-20T08:37:41.441612314Z I0320 08:37:41.441575 1 base_controller.go:123] Shutting down worker of openshift-apiserver-UnsupportedConfigOverrides controller ... 2026-03-20T08:37:41.441612314Z I0320 08:37:41.441607 1 base_controller.go:113] All openshift-apiserver-UnsupportedConfigOverrides workers have been terminated 2026-03-20T08:37:41.441633925Z I0320 08:37:41.441595 1 base_controller.go:113] All openshift-apiserver-RemoveStaleConditions workers have been terminated 2026-03-20T08:37:41.441658045Z I0320 08:37:41.441526 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-03-20T08:37:41.441688556Z I0320 08:37:41.441679 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-03-20T08:37:41.441716557Z I0320 08:37:41.441564 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-apiserver controller ... 2026-03-20T08:37:41.441740738Z I0320 08:37:41.441732 1 base_controller.go:113] All NamespaceFinalizerController_openshift-apiserver workers have been terminated 2026-03-20T08:37:41.441760638Z I0320 08:37:41.441571 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-20T08:37:41.441789469Z I0320 08:37:41.441769 1 base_controller.go:181] Shutting down ConnectivityCheckController ... 2026-03-20T08:37:41.441797859Z I0320 08:37:41.441792 1 base_controller.go:181] Shutting down OpenShiftAPIServer-WorkloadWorkloadController ... 2026-03-20T08:37:41.441806360Z I0320 08:37:41.441793 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-20T08:37:41.441813830Z I0320 08:37:41.441807 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionPrune ... 2026-03-20T08:37:41.441838511Z I0320 08:37:41.441821 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionState ... 2026-03-20T08:37:41.441846831Z I0320 08:37:41.441836 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-20T08:37:41.441846831Z I0320 08:37:41.441840 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionCondition ... 2026-03-20T08:37:41.441870902Z I0320 08:37:41.441853 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionKey ... 2026-03-20T08:37:41.441870902Z I0320 08:37:41.441580 1 base_controller.go:123] Shutting down worker of StatusSyncer_openshift-apiserver controller ... 2026-03-20T08:37:41.441879762Z I0320 08:37:41.441872 1 base_controller.go:113] All StatusSyncer_openshift-apiserver workers have been terminated 2026-03-20T08:37:41.441904083Z I0320 08:37:41.441884 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionMigration ... 2026-03-20T08:37:41.441904083Z I0320 08:37:41.441889 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1316236709/tls.crt::/tmp/serving-cert-1316236709/tls.key" 2026-03-20T08:37:41.441912563Z I0320 08:37:41.441903 1 base_controller.go:181] Shutting down openshift-apiserver ... 2026-03-20T08:37:41.441943404Z I0320 08:37:41.441928 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2026-03-20T08:37:41.441977355Z I0320 08:37:41.441955 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-20T08:37:41.441986555Z I0320 08:37:41.441979 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-20T08:37:41.441994395Z I0320 08:37:41.441984 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-20T08:37:41.441994395Z I0320 08:37:41.441989 1 base_controller.go:181] Shutting down SecretRevisionPruneController ... 2026-03-20T08:37:41.442007156Z I0320 08:37:41.441999 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-20T08:37:41.442016766Z I0320 08:37:41.442010 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-20T08:37:41.442024526Z I0320 08:37:41.442015 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-20T08:37:41.442024526Z I0320 08:37:41.442010 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-20T08:37:41.442032616Z I0320 08:37:41.441775 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-20T08:37:41.442032616Z I0320 08:37:41.442025 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-03-20T08:37:41.442044997Z I0320 08:37:41.442031 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-03-20T08:37:41.442044997Z I0320 08:37:41.442038 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-20T08:37:41.442044997Z I0320 08:37:41.442040 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-20T08:37:41.442081038Z I0320 08:37:41.442062 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-20T08:37:41.442104448Z I0320 08:37:41.441826 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-20T08:37:41.442104448Z I0320 08:37:41.442097 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionPrune controller ... 2026-03-20T08:37:41.442114589Z I0320 08:37:41.442103 1 base_controller.go:113] All openshift-apiserver-EncryptionPrune workers have been terminated 2026-03-20T08:37:41.442114589Z I0320 08:37:41.442106 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionMigration controller ... 2026-03-20T08:37:41.442114589Z I0320 08:37:41.442110 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionState controller ... 2026-03-20T08:37:41.442122939Z I0320 08:37:41.442113 1 base_controller.go:113] All openshift-apiserver-EncryptionMigration workers have been terminated 2026-03-20T08:37:41.442122939Z I0320 08:37:41.442116 1 base_controller.go:113] All openshift-apiserver-EncryptionState workers have been terminated 2026-03-20T08:37:41.442131119Z I0320 08:37:41.442122 1 base_controller.go:123] Shutting down worker of openshift-apiserver controller ... 2026-03-20T08:37:41.442131119Z I0320 08:37:41.442127 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionKey controller ... 2026-03-20T08:37:41.442139149Z I0320 08:37:41.442133 1 base_controller.go:113] All openshift-apiserver-EncryptionKey workers have been terminated 2026-03-20T08:37:41.442139149Z I0320 08:37:41.442128 1 base_controller.go:113] All openshift-apiserver workers have been terminated 2026-03-20T08:37:41.442146710Z I0320 08:37:41.442088 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2026-03-20T08:37:41.442154950Z I0320 08:37:41.442145 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2026-03-20T08:37:41.442154950Z I0320 08:37:41.442093 1 base_controller.go:123] Shutting down worker of OpenShiftAPIServer-WorkloadWorkloadController controller ... 2026-03-20T08:37:41.442162710Z I0320 08:37:41.442150 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-20T08:37:41.442162710Z I0320 08:37:41.442154 1 base_controller.go:113] All OpenShiftAPIServer-WorkloadWorkloadController workers have been terminated 2026-03-20T08:37:41.442170710Z I0320 08:37:41.442162 1 builder.go:335] server exited 2026-03-20T08:37:41.442170710Z I0320 08:37:41.442022 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-20T08:37:41.442178561Z I0320 08:37:41.442123 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionCondition controller ... 2026-03-20T08:37:41.442178561Z E0320 08:37:41.442170 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the operator is shutting down, skipping updating conditions, err = failed to reconcile enabled APIs: [Get \"https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices/v1.project.openshift.io\": context canceled, client rate limiter Wait returned an error: context canceled]" 2026-03-20T08:37:41.442243072Z I0320 08:37:41.442042 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-20T08:37:41.442243072Z I0320 08:37:41.442176 1 base_controller.go:113] All openshift-apiserver-EncryptionCondition workers have been terminated 2026-03-20T08:37:41.442255603Z I0320 08:37:41.442172 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-20T08:37:41.442255603Z I0320 08:37:41.442207 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-20T08:37:41.443320654Z I0320 08:37:41.443290 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-03-20T08:37:41.443338364Z I0320 08:37:41.443317 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-03-20T08:37:46.439151574Z I0320 08:37:46.439036 1 observer_polling.go:162] Shutting down file observer 2026-03-20T08:38:15.445476618Z E0320 08:38:15.445413 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-20T08:38:15.445476618Z W0320 08:38:15.445462 1 leaderelection.go:84] leader election lost config/pod/openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-th2vj.json0000640000000000000000000001442215157203665030002 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-d65958b8-th2vj","generateName":"openshift-apiserver-operator-d65958b8-","namespace":"openshift-apiserver-operator","uid":"325f0a83-d56d-4b62-977b-088a7d5f0e00","resourceVersion":"9077","creationTimestamp":"2026-03-20T08:34:23Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"d65958b8"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.8/23\"],\"mac_address\":\"0a:58:0a:80:00:08\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.8/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.8\"\n ],\n \"mac\": \"0a:58:0a:80:00:08\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-d65958b8","uid":"63e9943e-fdfd-4cce-983d-8b665c1412fa","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-lqdlf","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.35"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-lqdlf","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c15"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:08Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:06Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:38:47Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:38:47Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.8","podIPs":[{"ip":"10.128.0.8"}],"startTime":"2026-03-20T08:36:06Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-03-20T08:38:46Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-20T08:36:20Z","finishedAt":"2026-03-20T08:38:15Z","containerID":"cri-o://d498d1943e73378963ddf1fcb87e4851f496c741db4b494c02cde7a06a7405b7"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","containerID":"cri-o://3fb2d44fc3d06ba7cfb01123d6eb14daa319280841df97c7fb0370eae6efe992","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-lqdlf","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}machine-config-server_current.log0000640000000000000000000000143615157203665034501 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-server-gj4pm2026-03-20T08:37:20.537908709Z I0320 08:37:20.537630 1 start.go:40] Version: 98386bbe (393b8dc2c216dbbbf68cd1ccde5cbc2b551b2fe8) 2026-03-20T08:37:20.643084028Z I0320 08:37:20.639612 1 start.go:51] Launching server with tls min version: VersionTLS12 & cipher suites [TLS_AES_128_GCM_SHA256 TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256] 2026-03-20T08:37:20.643084028Z I0320 08:37:20.639749 1 api.go:67] Launching server on :22624 2026-03-20T08:37:20.643084028Z I0320 08:37:20.639873 1 api.go:67] Launching server on :22623 kube-rbac-proxy_current.log0000640000000000000000000000202415157203665035214 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-operator-84d549f6d5-gm4qr2026-03-20T08:36:51.667576555Z W0320 08:36:51.666901 1 deprecated.go:66] 2026-03-20T08:36:51.667576555Z ==== Removed Flag Warning ====================== 2026-03-20T08:36:51.667576555Z 2026-03-20T08:36:51.667576555Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-20T08:36:51.667576555Z 2026-03-20T08:36:51.667576555Z =============================================== 2026-03-20T08:36:51.667576555Z 2026-03-20T08:36:51.667576555Z I0320 08:36:51.667077 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-03-20T08:36:51.667808782Z I0320 08:36:51.667791 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-20T08:36:51.669090199Z I0320 08:36:51.669062 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-20T08:36:51.669552643Z I0320 08:36:51.669391 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9001 2026-03-20T08:36:51.669867512Z I0320 08:36:51.669843 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9001 machine-config-operator_current.log0000640000000000000000000002277315157203665036717 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-operator-84d549f6d5-gm4qr2026-03-20T08:36:51.496143992Z I0320 08:36:51.496052 1 start.go:52] Version: 4.18.35 (Raw: 98386bbe, Hash: 393b8dc2c216dbbbf68cd1ccde5cbc2b551b2fe8) 2026-03-20T08:36:51.497615185Z I0320 08:36:51.496344 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-20T08:36:51.497615185Z I0320 08:36:51.497440 1 metrics.go:92] Registering Prometheus metrics 2026-03-20T08:36:51.497615185Z I0320 08:36:51.497502 1 metrics.go:99] Starting metrics listener on 127.0.0.1:8797 2026-03-20T08:36:51.511768708Z I0320 08:36:51.511056 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-config-operator/machine-config... 2026-03-20T08:36:51.524797588Z I0320 08:36:51.524727 1 leaderelection.go:268] successfully acquired lease openshift-machine-config-operator/machine-config 2026-03-20T08:36:51.540662271Z I0320 08:36:51.540574 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2026-03-20T08:36:51.568975897Z I0320 08:36:51.568801 1 start.go:132] FeatureGates initialized: knownFeatureGates=[AWSEFSDriverVolumeMetrics AdminNetworkPolicy AlibabaPlatform AzureWorkloadIdentity BareMetalLoadBalancer BuildCSIVolumes ChunkSizeMiB CloudDualStackNodeIPs DisableKubeletCloudCredentialProviders GCPLabelsTags HardwareSpeed IngressControllerLBSubnetsAWS KMSv1 ManagedBootImages ManagedBootImagesAWS MultiArchInstallAWS MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy OnClusterBuild PersistentIPsForVirtualization PrivateHostedZoneAWS SetEIPForNLBIngressController StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy AWSClusterHostedDNS AdditionalRoutingCapabilities AutomatedEtcdBackup BootcNodeManagement CSIDriverSharedResource ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GatewayAPI ImageStreamImportMode IngressControllerDynamicConfigurationManager InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAzure NodeSwap NutanixMultiSubnets OVNObservability OpenShiftPodSecurityAdmission PinnedImages PlatformOperators ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SignatureStores SigstoreImageVerification TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereMultiNetworks VolumeAttributesClass VolumeGroupSnapshot] 2026-03-20T08:36:51.579423052Z I0320 08:36:51.579297 1 event.go:377] Event(v1.ObjectReference{Kind:"Node", Namespace:"openshift-machine-config-operator", Name:"master-0", UID:"7bc50120-3879-4454-8162-ec2f348aada5", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'FeatureGatesInitialized' FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}} 2026-03-20T08:36:51.606699188Z I0320 08:36:51.606608 1 operator.go:389] On-cluster layering featuregate enabled, starting MachineOSConfig informer 2026-03-20T08:36:51.635519659Z I0320 08:36:51.635177 1 operator.go:436] Change observed to kube-apiserver-server-ca 2026-03-20T08:36:51.823893337Z I0320 08:36:51.823820 1 operator.go:436] Change observed to kube-apiserver-server-ca 2026-03-20T08:36:51.908026812Z I0320 08:36:51.907915 1 operator.go:416] Starting MachineConfigOperator 2026-03-20T08:36:51.908523946Z I0320 08:36:51.908451 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterOperator", Namespace:"openshift-machine-config-operator", Name:"machine-config", UID:"4f114142-6d5c-483e-b724-5418921f72cc", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/machine-config started a version change from [] to [{operator 4.18.35} {operator-image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015}] 2026-03-20T08:36:51.908657540Z I0320 08:36:51.908636 1 sync.go:412] creating merged-trusted-image-registry-ca 2026-03-20T08:36:51.917288092Z E0320 08:36:51.914223 1 sync.go:2172] exiting image registry secrets fetch - machine-os-puller service account does not exist yet. 2026-03-20T08:36:51.917288092Z I0320 08:36:51.915082 1 sync.go:2256] MachineConfiguration object doesn't exist; a new one will be created 2026-03-20T08:37:05.593343826Z W0320 08:37:05.591646 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-20T08:37:08.831322689Z E0320 08:37:08.831234 1 sync.go:1036] Issue getting the kubeconfig-data configmap: configmaps "kubeconfig-data" not found 2026-03-20T08:37:09.782063014Z I0320 08:37:09.775674 1 machineconfig.go:87] ControllerConfig not found, creating new one 2026-03-20T08:37:14.569958818Z W0320 08:37:14.569887 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-20T08:37:23.004743238Z I0320 08:37:23.004676 1 sync.go:2288] Updating MachineConfiguration status 2026-03-20T08:37:23.060663800Z I0320 08:37:23.059015 1 sync.go:1990] Stamped boot images configmap with 393b8dc2c216dbbbf68cd1ccde5cbc2b551b2fe8 and 4.18.35, machine pool updated count: 1 2026-03-20T08:37:23.060762653Z I0320 08:37:23.060717 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterOperator", Namespace:"openshift-machine-config-operator", Name:"machine-config", UID:"4f114142-6d5c-483e-b724-5418921f72cc", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/machine-config version changed from [] to [{operator 4.18.35} {operator-image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015}] 2026-03-20T08:38:25.534355788Z E0320 08:38:25.534155 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-20T08:38:34.694229899Z E0320 08:38:34.694028 1 sync.go:1036] Issue getting the kubeconfig-data configmap: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kubeconfig-data) 2026-03-20T08:38:50.795963105Z I0320 08:38:50.795498 1 event.go:377] Event(v1.ObjectReference{Kind:"", Namespace:"openshift-machine-config-operator", Name:"machine-config", UID:"4f114142-6d5c-483e-b724-5418921f72cc", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'OperatorDegraded: MachineConfigControllerFailed' Failed to resync 4.18.35 because: Could not make kubeconfig-data CM, configmaps "kubeconfig-data" already exists kube-rbac-proxy_current.log0000640000000000000000000000202415157203665033150 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-daemon-9t8x62026-03-20T08:37:03.377253364Z W0320 08:37:03.371176 10662 deprecated.go:66] 2026-03-20T08:37:03.377253364Z ==== Removed Flag Warning ====================== 2026-03-20T08:37:03.377253364Z 2026-03-20T08:37:03.377253364Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-20T08:37:03.377253364Z 2026-03-20T08:37:03.377253364Z =============================================== 2026-03-20T08:37:03.377253364Z 2026-03-20T08:37:03.377253364Z I0320 08:37:03.371365 10662 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-03-20T08:37:03.377253364Z I0320 08:37:03.372369 10662 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-20T08:37:03.377253364Z I0320 08:37:03.376739 10662 kube-rbac-proxy.go:347] Reading certificate files 2026-03-20T08:37:03.397520425Z I0320 08:37:03.395341 10662 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9001 2026-03-20T08:37:03.397520425Z I0320 08:37:03.395868 10662 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9001 machine-config-daemon_current.log0000640000000000000000000004404315157203665034255 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-daemon-9t8x62026-03-20T08:37:03.931330514Z I0320 08:37:03.929964 10535 start.go:219] FeatureGates initialized: knownFeatureGates=[AWSEFSDriverVolumeMetrics AdminNetworkPolicy AlibabaPlatform AzureWorkloadIdentity BareMetalLoadBalancer BuildCSIVolumes ChunkSizeMiB CloudDualStackNodeIPs DisableKubeletCloudCredentialProviders GCPLabelsTags HardwareSpeed IngressControllerLBSubnetsAWS KMSv1 ManagedBootImages ManagedBootImagesAWS MultiArchInstallAWS MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy OnClusterBuild PersistentIPsForVirtualization PrivateHostedZoneAWS SetEIPForNLBIngressController StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy AWSClusterHostedDNS AdditionalRoutingCapabilities AutomatedEtcdBackup BootcNodeManagement CSIDriverSharedResource ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GatewayAPI ImageStreamImportMode IngressControllerDynamicConfigurationManager InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAzure NodeSwap NutanixMultiSubnets OVNObservability OpenShiftPodSecurityAdmission PinnedImages PlatformOperators ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SignatureStores SigstoreImageVerification TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereMultiNetworks VolumeAttributesClass VolumeGroupSnapshot] 2026-03-20T08:37:03.931330514Z I0320 08:37:03.930048 10535 update.go:2854] "Starting to manage node: master-0" 2026-03-20T08:37:03.931330514Z I0320 08:37:03.930536 10535 event.go:377] Event(v1.ObjectReference{Kind:"Node", Namespace:"openshift-machine-config-operator", Name:"master-0", UID:"7bc50120-3879-4454-8162-ec2f348aada5", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'FeatureGatesInitialized' FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}} 2026-03-20T08:37:03.939614845Z I0320 08:37:03.936642 10535 image_manager_helper.go:92] Running captured: rpm-ostree status 2026-03-20T08:37:04.111613295Z I0320 08:37:04.108513 10535 daemon.go:1748] State: idle 2026-03-20T08:37:04.111613295Z Deployments: 2026-03-20T08:37:04.111613295Z * ostree-unverified-registry:quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f5726322e050cdd4c508be51d2c99a3168eb7535ddc5f2a298df3059ea6c0071 2026-03-20T08:37:04.111613295Z Digest: sha256:f5726322e050cdd4c508be51d2c99a3168eb7535ddc5f2a298df3059ea6c0071 2026-03-20T08:37:04.111613295Z Version: 418.94.202603021444-0 (2026-03-02T14:49:38Z) 2026-03-20T08:37:04.111613295Z 2026-03-20T08:37:04.111613295Z ostree-image-signed:oci-archive:/rhcos-418.94.202602022246-0-ostree.x86_64.ociarchive 2026-03-20T08:37:04.111613295Z Digest: sha256:94485ef7d0f493c34f83a18744458e49d0b2c096e52f0fd6c541fcc73e26fc75 2026-03-20T08:37:04.111613295Z Version: 418.94.202602022246-0 (2026-02-02T22:51:03Z) 2026-03-20T08:37:04.111613295Z I0320 08:37:04.109552 10535 coreos.go:53] CoreOS aleph version: mtime=2022-08-01 23:42:11 +0000 UTC 2026-03-20T08:37:04.111613295Z { 2026-03-20T08:37:04.111613295Z "container-image": { 2026-03-20T08:37:04.111613295Z "image-digest": "sha256:680a062cb3b0656c92e1599fd3eb69e66a90951817ea6b75673f625d5f6f1075", 2026-03-20T08:37:04.111613295Z "image-labels": { 2026-03-20T08:37:04.111613295Z "containers.bootc": "1", 2026-03-20T08:37:04.111613295Z "coreos-assembler.image-config-checksum": "b444a32e2801642f1e41777fd51fa53304496c58a3a6b15e5964a1f86f866507", 2026-03-20T08:37:04.111613295Z "coreos-assembler.image-input-checksum": "e1054a8c71c973556532471bef0151cc70fa819167fb1f3a84f541e31c77ada7", 2026-03-20T08:37:04.111613295Z "io.openshift.build.version-display-names": "machine-os=Red Hat Enterprise Linux CoreOS", 2026-03-20T08:37:04.111613295Z "io.openshift.build.versions": "machine-os=418.94.202602022246-0", 2026-03-20T08:37:04.111613295Z "org.opencontainers.image.revision": "e221971a4bbfc9cb9b57c4d99b700b8e8ef9fb76", 2026-03-20T08:37:04.111613295Z "org.opencontainers.image.source": "https://github.com/openshift/os", 2026-03-20T08:37:04.111613295Z "org.opencontainers.image.version": "418.94.202602022246-0", 2026-03-20T08:37:04.111613295Z "ostree.bootable": "true", 2026-03-20T08:37:04.111613295Z "ostree.commit": "e5bd1e55eafc9bea05838be0bae98e353aa8adb9c961ba18b572f8bb45d593eb", 2026-03-20T08:37:04.111613295Z "ostree.final-diffid": "sha256:12787d84fa137cd5649a9005efe98ec9d05ea46245fdc50aecb7dd007f2035b1", 2026-03-20T08:37:04.111613295Z "ostree.linux": "5.14.0-427.109.1.el9_4.x86_64", 2026-03-20T08:37:04.111613295Z "rpmostree.inputhash": "48cb5147f76399ba3faccdb80d4f920fe2e93e642cdd079c7c9c49d591490571" 2026-03-20T08:37:04.111613295Z }, 2026-03-20T08:37:04.111613295Z "image-name": "oci-archive:/rhcos-418.94.202602022246-0-ostree.x86_64.ociarchive" 2026-03-20T08:37:04.111613295Z }, 2026-03-20T08:37:04.111613295Z "osbuild-version": "147", 2026-03-20T08:37:04.111613295Z "ostree-commit": "e5bd1e55eafc9bea05838be0bae98e353aa8adb9c961ba18b572f8bb45d593eb", 2026-03-20T08:37:04.111613295Z "ref": "docker://ostree-image-signed:oci-archive:/rhcos-418.94.202602022246-0-ostree.x86_64.ociarchive", 2026-03-20T08:37:04.111613295Z "version": "418.94.202602022246-0" 2026-03-20T08:37:04.111613295Z } 2026-03-20T08:37:04.111613295Z I0320 08:37:04.109704 10535 coreos.go:70] Ignition provisioning: time=2026-03-20T08:33:15Z 2026-03-20T08:37:04.111613295Z I0320 08:37:04.109714 10535 image_manager_helper.go:92] Running captured: journalctl --list-boots 2026-03-20T08:37:04.118341691Z I0320 08:37:04.117651 10535 daemon.go:1757] journalctl --list-boots: 2026-03-20T08:37:04.118341691Z IDX BOOT ID FIRST ENTRY LAST ENTRY 2026-03-20T08:37:04.118341691Z 0 2d4df50678814563b01f2840d2bdb60b Fri 2026-03-20 08:33:03 UTC Fri 2026-03-20 08:37:04 UTC 2026-03-20T08:37:04.118341691Z I0320 08:37:04.117711 10535 image_manager_helper.go:92] Running captured: systemctl list-units --state=failed --no-legend 2026-03-20T08:37:04.130509876Z I0320 08:37:04.129234 10535 daemon.go:1773] systemd service state: OK 2026-03-20T08:37:04.130509876Z I0320 08:37:04.129269 10535 daemon.go:1314] Starting MachineConfigDaemon 2026-03-20T08:37:04.130509876Z I0320 08:37:04.129416 10535 daemon.go:1321] Enabling Kubelet Healthz Monitor 2026-03-20T08:37:04.198936253Z I0320 08:37:04.198835 10535 daemon.go:2805] Found 0 requested local packages in the booted deployment 2026-03-20T08:37:04.923375954Z I0320 08:37:04.922736 10535 daemon.go:654] Node master-0 is part of the control plane 2026-03-20T08:37:05.052283946Z E0320 08:37:05.049492 10535 writer.go:231] Marking Degraded due to: "could not get ControllerConfig: controllerconfig.machineconfiguration.openshift.io \"machine-config-controller\" not found" 2026-03-20T08:37:07.067815545Z I0320 08:37:07.067521 10535 daemon.go:742] Transitioned from state: -> Degraded 2026-03-20T08:37:07.067815545Z I0320 08:37:07.067551 10535 daemon.go:745] Transitioned from degraded/unreconcilable reason -> could not get ControllerConfig: controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:07.067815545Z E0320 08:37:07.067592 10535 writer.go:231] Marking Degraded due to: "could not get ControllerConfig: controllerconfig.machineconfiguration.openshift.io \"machine-config-controller\" not found" 2026-03-20T08:37:10.654246736Z I0320 08:37:10.653774 10535 certificate_writer.go:176] Unable to decode cert into a pem block. Cert is either empty or invalid. 2026-03-20T08:37:10.654246736Z I0320 08:37:10.653836 10535 update.go:2854] "Cert not found in kubeconfig. This means we need to write to disk. Subject is: kube-apiserver-lb-signer" 2026-03-20T08:37:10.673898290Z I0320 08:37:10.673622 10535 update.go:2854] "Skipping kubelet restart" 2026-03-20T08:37:10.677433523Z I0320 08:37:10.676934 10535 update.go:2854] "Cert not found in kubeconfig. This means we need to write to disk. Subject is: kube-apiserver-localhost-signer" 2026-03-20T08:37:10.679720110Z I0320 08:37:10.679705 10535 update.go:2854] "Skipping kubelet restart" 2026-03-20T08:37:10.684467098Z I0320 08:37:10.684452 10535 update.go:2854] "Cert not found in kubeconfig. This means we need to write to disk. Subject is: openshift-kube-apiserver-operator_localhost-recovery-serving-signer@1773995771" 2026-03-20T08:37:10.690651889Z I0320 08:37:10.690632 10535 update.go:2854] "Skipping kubelet restart" 2026-03-20T08:37:10.693798541Z I0320 08:37:10.693522 10535 certificate_writer.go:224] Writing new Data to /etc/kubernetes/kubeconfig 2026-03-20T08:37:11.479419527Z I0320 08:37:11.478356 10535 certificate_writer.go:294] Certificate was synced from controllerconfig resourceVersion 8166 2026-03-20T08:37:11.540012086Z I0320 08:37:11.539946 10535 certificate_writer.go:176] Unable to decode cert into a pem block. Cert is either empty or invalid. 2026-03-20T08:37:11.614314894Z I0320 08:37:11.614241 10535 certificate_writer.go:294] Certificate was synced from controllerconfig resourceVersion 8175 2026-03-20T08:37:11.636562753Z I0320 08:37:11.636252 10535 certificate_writer.go:176] Unable to decode cert into a pem block. Cert is either empty or invalid. 2026-03-20T08:37:11.676842129Z I0320 08:37:11.673657 10535 certificate_writer.go:294] Certificate was synced from controllerconfig resourceVersion 8209 2026-03-20T08:37:12.710144094Z I0320 08:37:12.710025 10535 certificate_writer.go:176] Unable to decode cert into a pem block. Cert is either empty or invalid. 2026-03-20T08:37:12.728623523Z I0320 08:37:12.728573 10535 certificate_writer.go:294] Certificate was synced from controllerconfig resourceVersion 8292 2026-03-20T08:37:15.078480788Z I0320 08:37:15.078384 10535 daemon.go:1922] Running: /run/machine-config-daemon-bin/nmstatectl persist-nic-names --root / --kargs-out /tmp/nmstate-kargs1530896306 --cleanup 2026-03-20T08:37:15.081099684Z 2026-03-20T08:37:15.081117555Z [2026-03-20T08:37:15Z INFO nmstatectl] Nmstate version: 2.2.56 2026-03-20T08:37:15.081117555Z [2026-03-20T08:37:15Z INFO nmstatectl::persist_nic] systemd predictable network interface name is disabled by kernel argument `net.ifnames=0`, will do nothing 2026-03-20T08:37:15.084461102Z I0320 08:37:15.084369 10535 node.go:23] No machineconfiguration.openshift.io/currentConfig annotation on node master-0: map[k8s.ovn.org/host-cidrs:["192.168.32.10/24"] k8s.ovn.org/l3-gateway-config:{"default":{"mode":"local","bridge-id":"br-ex","interface-id":"br-ex_master-0","mac-address":"fa:16:9e:81:f6:10","ip-addresses":["192.168.32.10/24"],"ip-address":"192.168.32.10/24","next-hops":["192.168.32.1"],"next-hop":"192.168.32.1","node-port-enable":"true","vlan-id":"0"}} k8s.ovn.org/node-chassis-id:7f879c5a-ffe7-4de2-928c-cc470e6d6898 k8s.ovn.org/node-encap-ips:["192.168.32.10"] k8s.ovn.org/node-id:2 k8s.ovn.org/node-masquerade-subnet:{"ipv4":"169.254.0.0/17","ipv6":"fd69::/112"} k8s.ovn.org/node-primary-ifaddr:{"ipv4":"192.168.32.10/24"} k8s.ovn.org/node-subnets:{"default":["10.128.0.0/23"]} k8s.ovn.org/node-transit-switch-port-ifaddr:{"ipv4":"100.88.0.2/16"} k8s.ovn.org/zone-name:master-0 machineconfiguration.openshift.io/lastObservedServerCAAnnotation:true machineconfiguration.openshift.io/lastSyncedControllerConfigResourceVersion:8292 machineconfiguration.openshift.io/reason:could not get ControllerConfig: controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found machineconfiguration.openshift.io/state:Degraded volumes.kubernetes.io/controller-managed-attach-detach:true], in cluster bootstrap, loading initial node annotation from /etc/machine-config-daemon/node-annotations.json 2026-03-20T08:37:15.084558355Z I0320 08:37:15.084530 10535 node.go:52] Setting initial node config: rendered-master-47246abc0cee5fbe972e47e23f330f37 2026-03-20T08:37:15.103330633Z I0320 08:37:15.102995 10535 daemon.go:1646] In bootstrap mode 2026-03-20T08:37:15.113147389Z W0320 08:37:15.113037 10535 daemon.go:1688] failed to query for deployment failure: error querying for previous finalization via journalctl: exit status 1 2026-03-20T08:37:15.113147389Z I0320 08:37:15.113078 10535 daemon.go:1701] Current+desired config: rendered-master-47246abc0cee5fbe972e47e23f330f37 2026-03-20T08:37:15.113147389Z I0320 08:37:15.113084 10535 daemon.go:1716] state: Done 2026-03-20T08:37:15.113147389Z I0320 08:37:15.113133 10535 update.go:2809] Running: rpm-ostree cleanup -r 2026-03-20T08:37:20.632239621Z Bootloader updated; bootconfig swap: yes; bootversion: boot.1.1, deployment count change: -1 2026-03-20T08:37:26.019652981Z Pruned images: 1 (layers: 31) 2026-03-20T08:37:27.989262599Z I0320 08:37:27.989139 10535 certificate_writer.go:294] Certificate was synced from controllerconfig resourceVersion 8663 2026-03-20T08:37:28.011679913Z I0320 08:37:28.010063 10535 certificate_writer.go:294] Certificate was synced from controllerconfig resourceVersion 8664 2026-03-20T08:37:29.805824121Z I0320 08:37:29.805733 10535 certificate_writer.go:294] Certificate was synced from controllerconfig resourceVersion 8707 2026-03-20T08:37:31.634664181Z Freed: 785.6?MB (pkgcache branches: 0) 2026-03-20T08:37:31.645766945Z I0320 08:37:31.645678 10535 update.go:2854] "No bootstrap pivot required; unlinking bootstrap node annotations" 2026-03-20T08:37:31.648717101Z I0320 08:37:31.648652 10535 daemon.go:2120] Validating against current config rendered-master-47246abc0cee5fbe972e47e23f330f37 2026-03-20T08:37:31.649356040Z I0320 08:37:31.649293 10535 daemon.go:2009] SSH key location update required. Moving SSH keys from "/home/core/.ssh/authorized_keys" to "/home/core/.ssh/authorized_keys.d/ignition". 2026-03-20T08:37:31.661229316Z I0320 08:37:31.661162 10535 update.go:2491] updating SSH keys 2026-03-20T08:37:31.661688690Z I0320 08:37:31.661660 10535 update.go:2392] Writing SSH keys to "/home/core/.ssh/authorized_keys.d/ignition" 2026-03-20T08:37:31.661718440Z I0320 08:37:31.661708 10535 update.go:2357] Creating missing SSH key dir at "/home/core/.ssh/authorized_keys.d" 2026-03-20T08:37:31.719879488Z I0320 08:37:31.719784 10535 image_manager_helper.go:92] Running captured: rpm-ostree kargs 2026-03-20T08:37:31.795849115Z I0320 08:37:31.795557 10535 update.go:2854] "Validated on-disk state" 2026-03-20T08:37:31.809404350Z I0320 08:37:31.809333 10535 daemon.go:2225] Completing update to target MachineConfig: rendered-master-47246abc0cee5fbe972e47e23f330f37 2026-03-20T08:38:41.825715785Z W0320 08:38:41.825605 10535 daemon.go:2428] Failed to get node: the server was unable to return a response in the time allotted, but may still be processing the request (get nodes master-0) 2026-03-20T08:38:51.829089230Z I0320 08:38:51.828825 10535 update.go:2854] "Update completed for config rendered-master-47246abc0cee5fbe972e47e23f330f37 and node has been successfully uncordoned" 2026-03-20T08:38:51.943373845Z I0320 08:38:51.942224 10535 daemon.go:2250] In desired state MachineConfig: rendered-master-47246abc0cee5fbe972e47e23f330f37 2026-03-20T08:38:51.973856685Z I0320 08:38:51.973273 10535 config_drift_monitor.go:246] Config Drift Monitor started 2026-03-20T08:38:51.973856685Z I0320 08:38:51.973460 10535 daemon.go:745] Transitioned from degraded/unreconcilable reason could not get ControllerConfig: controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found -> kube-rbac-proxy_current.log0000640000000000000000000000202415157203665035535 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-controller-b4f87c5b9-pj7rj2026-03-20T08:37:07.738342313Z W0320 08:37:07.737389 1 deprecated.go:66] 2026-03-20T08:37:07.738342313Z ==== Removed Flag Warning ====================== 2026-03-20T08:37:07.738342313Z 2026-03-20T08:37:07.738342313Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-20T08:37:07.738342313Z 2026-03-20T08:37:07.738342313Z =============================================== 2026-03-20T08:37:07.738342313Z 2026-03-20T08:37:07.738342313Z I0320 08:37:07.737549 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-03-20T08:37:07.738342313Z I0320 08:37:07.738148 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-20T08:37:07.741623888Z I0320 08:37:07.741164 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-20T08:37:07.741623888Z I0320 08:37:07.741488 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9001 2026-03-20T08:37:07.743110262Z I0320 08:37:07.742221 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9001 machine-config-controller_current.log0000640000000000000000000007045315157203665037566 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-controller-b4f87c5b9-pj7rj2026-03-20T08:37:07.542728664Z I0320 08:37:07.542699 1 reflector.go:368] Caches populated for *v1.ImageTagMirrorSet from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-20T08:37:07.543024583Z I0320 08:37:07.542729 1 reflector.go:368] Caches populated for *v1.ControllerConfig from github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125 2026-03-20T08:37:07.543068244Z I0320 08:37:07.543041 1 reflector.go:368] Caches populated for *v1.KubeletConfig from github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125 2026-03-20T08:37:07.543124256Z I0320 08:37:07.543086 1 reflector.go:368] Caches populated for *v1.ClusterVersion from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-20T08:37:07.543226299Z I0320 08:37:07.543179 1 reflector.go:368] Caches populated for *v1.MachineConfigPool from github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125 2026-03-20T08:37:07.543590439Z I0320 08:37:07.543377 1 reflector.go:368] Caches populated for *v1alpha1.ImageContentSourcePolicy from github.com/openshift/client-go/operator/informers/externalversions/factory.go:125 2026-03-20T08:37:07.543590439Z I0320 08:37:07.543456 1 reflector.go:368] Caches populated for *v1.APIServer from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-20T08:37:07.543662371Z I0320 08:37:07.543626 1 kubelet_config_controller.go:222] Re-syncing all kubelet config controller generated MachineConfigs due to apiServer cluster change 2026-03-20T08:37:07.543705603Z I0320 08:37:07.543679 1 reflector.go:368] Caches populated for *v1.ContainerRuntimeConfig from github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125 2026-03-20T08:37:07.552230051Z E0320 08:37:07.551088 1 template_controller.go:252] "Unhandled Error" err="couldn't get ControllerConfig on dependency callback &%!w(errors.StatusError=errors.StatusError{ErrStatus:v1.Status{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ListMeta:v1.ListMeta{SelfLink:\"\", ResourceVersion:\"\", Continue:\"\", RemainingItemCount:(*int64)(nil)}, Status:\"Failure\", Message:\"controllerconfig.machineconfiguration.openshift.io \\\"machine-config-controller\\\" not found\", Reason:\"NotFound\", Details:(*v1.StatusDetails)(0xc00067f0e0), Code:404}})" 2026-03-20T08:37:07.566248900Z I0320 08:37:07.553029 1 template_controller.go:205] Re-syncing ControllerConfig due to apiServer cluster change 2026-03-20T08:37:07.568575768Z I0320 08:37:07.568522 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:37:07.568886497Z E0320 08:37:07.568836 1 node_controller.go:535] getting scheduler config failed: cluster scheduler couldn't be found 2026-03-20T08:37:07.569160015Z I0320 08:37:07.569133 1 reflector.go:368] Caches populated for *v1.Scheduler from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-20T08:37:07.569824325Z I0320 08:37:07.569209 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:37:07.570158835Z E0320 08:37:07.569352 1 template_controller.go:252] "Unhandled Error" err="couldn't get ControllerConfig on dependency callback &%!w(errors.StatusError=errors.StatusError{ErrStatus:v1.Status{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ListMeta:v1.ListMeta{SelfLink:\"\", ResourceVersion:\"\", Continue:\"\", RemainingItemCount:(*int64)(nil)}, Status:\"Failure\", Message:\"controllerconfig.machineconfiguration.openshift.io \\\"machine-config-controller\\\" not found\", Reason:\"NotFound\", Details:(*v1.StatusDetails)(0xc000d01bc0), Code:404}})" 2026-03-20T08:37:07.570253877Z I0320 08:37:07.570142 1 reflector.go:368] Caches populated for *v1.FeatureGate from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-20T08:37:07.571080921Z I0320 08:37:07.571034 1 start.go:105] FeatureGates initialized: enabled=[AWSEFSDriverVolumeMetrics AdminNetworkPolicy AlibabaPlatform AzureWorkloadIdentity BareMetalLoadBalancer BuildCSIVolumes ChunkSizeMiB CloudDualStackNodeIPs DisableKubeletCloudCredentialProviders GCPLabelsTags HardwareSpeed IngressControllerLBSubnetsAWS KMSv1 ManagedBootImages ManagedBootImagesAWS MultiArchInstallAWS MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy OnClusterBuild PersistentIPsForVirtualization PrivateHostedZoneAWS SetEIPForNLBIngressController StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy] disabled=[AWSClusterHostedDNS AdditionalRoutingCapabilities AutomatedEtcdBackup BootcNodeManagement CSIDriverSharedResource ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GatewayAPI ImageStreamImportMode IngressControllerDynamicConfigurationManager InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAzure NodeSwap NutanixMultiSubnets OVNObservability OpenShiftPodSecurityAdmission PinnedImages PlatformOperators ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SignatureStores SigstoreImageVerification TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereMultiNetworks VolumeAttributesClass VolumeGroupSnapshot] 2026-03-20T08:37:07.571316928Z I0320 08:37:07.571235 1 event.go:377] Event(v1.ObjectReference{Kind:"Node", Namespace:"openshift-machine-config-operator", Name:"master-0", UID:"7bc50120-3879-4454-8162-ec2f348aada5", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'FeatureGatesInitialized' FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}} 2026-03-20T08:37:07.571345539Z I0320 08:37:07.571315 1 template_controller.go:146] Re-syncing ControllerConfig due to secret pull-secret change 2026-03-20T08:37:07.585738799Z I0320 08:37:07.581901 1 drain_controller.go:169] Starting MachineConfigController-DrainController 2026-03-20T08:37:07.585738799Z I0320 08:37:07.582012 1 template_controller.go:301] Starting MachineConfigController-TemplateController 2026-03-20T08:37:07.585738799Z I0320 08:37:07.582054 1 kubelet_config_controller.go:201] Starting MachineConfigController-KubeletConfigController 2026-03-20T08:37:07.585738799Z I0320 08:37:07.582806 1 container_runtime_config_controller.go:247] Starting MachineConfigController-ContainerRuntimeConfigController 2026-03-20T08:37:07.585738799Z I0320 08:37:07.584329 1 render_controller.go:141] Starting MachineConfigController-RenderController 2026-03-20T08:37:07.585738799Z I0320 08:37:07.584389 1 node_controller.go:249] Starting MachineConfigController-NodeController 2026-03-20T08:37:07.585738799Z I0320 08:37:07.584460 1 kubelet_config_controller.go:410] Error syncing kubeletconfig cluster: could not get ControllerConfig: controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:07.595362270Z I0320 08:37:07.589404 1 container_runtime_config_controller.go:499] Error syncing image config openshift-config: could not get ControllerConfig controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:07.595362270Z I0320 08:37:07.589571 1 reflector.go:368] Caches populated for *v1.MachineOSConfig from github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125 2026-03-20T08:37:07.595362270Z I0320 08:37:07.589990 1 kubelet_config_controller.go:410] Error syncing kubeletconfig cluster: could not get ControllerConfig: controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:07.595698250Z I0320 08:37:07.595666 1 container_runtime_config_controller.go:499] Error syncing image config openshift-config: could not get ControllerConfig controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:07.600508070Z I0320 08:37:07.600471 1 kubelet_config_controller.go:410] Error syncing kubeletconfig cluster: could not get ControllerConfig: controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:07.606409102Z I0320 08:37:07.606263 1 container_runtime_config_controller.go:499] Error syncing image config openshift-config: could not get ControllerConfig controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:07.622258505Z I0320 08:37:07.621529 1 kubelet_config_controller.go:410] Error syncing kubeletconfig cluster: could not get ControllerConfig: controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:07.627629392Z I0320 08:37:07.626671 1 container_runtime_config_controller.go:499] Error syncing image config openshift-config: could not get ControllerConfig controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:07.662763607Z I0320 08:37:07.662393 1 kubelet_config_controller.go:410] Error syncing kubeletconfig cluster: could not get ControllerConfig: controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:07.672330346Z I0320 08:37:07.668603 1 container_runtime_config_controller.go:499] Error syncing image config openshift-config: could not get ControllerConfig controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:07.688629522Z I0320 08:37:07.682851 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:37:07.752142855Z I0320 08:37:07.751416 1 kubelet_config_controller.go:410] Error syncing kubeletconfig cluster: could not get ControllerConfig: controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:07.752142855Z I0320 08:37:07.751592 1 container_runtime_config_controller.go:499] Error syncing image config openshift-config: could not get ControllerConfig controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:07.911796565Z I0320 08:37:07.911719 1 kubelet_config_controller.go:410] Error syncing kubeletconfig cluster: could not get ControllerConfig: controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:07.912118944Z I0320 08:37:07.911984 1 container_runtime_config_controller.go:499] Error syncing image config openshift-config: could not get ControllerConfig controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:08.233900314Z I0320 08:37:08.233829 1 kubelet_config_controller.go:410] Error syncing kubeletconfig cluster: could not get ControllerConfig: controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:08.234037618Z I0320 08:37:08.234014 1 container_runtime_config_controller.go:499] Error syncing image config openshift-config: could not get ControllerConfig controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:08.875371165Z I0320 08:37:08.875275 1 kubelet_config_controller.go:410] Error syncing kubeletconfig cluster: could not get ControllerConfig: controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:08.875547370Z I0320 08:37:08.875466 1 container_runtime_config_controller.go:499] Error syncing image config openshift-config: could not get ControllerConfig controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:10.155819401Z I0320 08:37:10.155723 1 kubelet_config_controller.go:410] Error syncing kubeletconfig cluster: could not get ControllerConfig: controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:10.155919884Z I0320 08:37:10.155890 1 container_runtime_config_controller.go:499] Error syncing image config openshift-config: could not get ControllerConfig controllerconfig.machineconfiguration.openshift.io "machine-config-controller" not found 2026-03-20T08:37:11.941729789Z I0320 08:37:11.941651 1 kubelet_config_nodes.go:169] Applied Node configuration 97-master-generated-kubelet on MachineConfigPool master 2026-03-20T08:37:12.174838282Z I0320 08:37:12.174530 1 kubelet_config_nodes.go:169] Applied Node configuration 97-worker-generated-kubelet on MachineConfigPool worker 2026-03-20T08:37:12.345367468Z I0320 08:37:12.342470 1 kubelet_config_features.go:126] Applied FeatureSet cluster on MachineConfigPool master 2026-03-20T08:37:12.544283383Z I0320 08:37:12.544170 1 render_controller.go:394] Error syncing machineconfigpool master: ControllerConfig has not completed: completed(false) running(true) failing(false) 2026-03-20T08:37:12.544283383Z I0320 08:37:12.544259 1 render_controller.go:394] Error syncing machineconfigpool worker: ControllerConfig has not completed: completed(false) running(true) failing(false) 2026-03-20T08:37:12.544340515Z I0320 08:37:12.544305 1 node_controller.go:1045] Pool master is unconfigured, pausing 5s for renderer to initialize 2026-03-20T08:37:12.544361466Z I0320 08:37:12.544344 1 node_controller.go:1045] Pool worker is unconfigured, pausing 5s for renderer to initialize 2026-03-20T08:37:12.549793524Z I0320 08:37:12.549720 1 render_controller.go:394] Error syncing machineconfigpool master: ControllerConfig has not completed: completed(false) running(true) failing(false) 2026-03-20T08:37:12.549793524Z I0320 08:37:12.549789 1 render_controller.go:394] Error syncing machineconfigpool worker: ControllerConfig has not completed: completed(false) running(true) failing(false) 2026-03-20T08:37:12.561476365Z I0320 08:37:12.561321 1 render_controller.go:394] Error syncing machineconfigpool master: ControllerConfig has not completed: completed(false) running(true) failing(false) 2026-03-20T08:37:12.561476365Z I0320 08:37:12.561398 1 render_controller.go:394] Error syncing machineconfigpool worker: ControllerConfig has not completed: completed(false) running(true) failing(false) 2026-03-20T08:37:12.582625482Z I0320 08:37:12.582555 1 render_controller.go:394] Error syncing machineconfigpool master: ControllerConfig has not completed: completed(false) running(true) failing(false) 2026-03-20T08:37:12.582657973Z I0320 08:37:12.582555 1 render_controller.go:394] Error syncing machineconfigpool worker: ControllerConfig has not completed: completed(false) running(true) failing(false) 2026-03-20T08:37:12.624156904Z I0320 08:37:12.623678 1 render_controller.go:394] Error syncing machineconfigpool master: ControllerConfig has not completed: completed(false) running(true) failing(false) 2026-03-20T08:37:12.624156904Z I0320 08:37:12.623784 1 render_controller.go:394] Error syncing machineconfigpool worker: ControllerConfig has not completed: completed(false) running(true) failing(false) 2026-03-20T08:37:12.732604789Z I0320 08:37:12.732533 1 kubelet_config_features.go:126] Applied FeatureSet cluster on MachineConfigPool worker 2026-03-20T08:37:12.851531650Z I0320 08:37:12.851451 1 render_controller.go:560] Generated machineconfig rendered-worker-6c41cf327075224fbef5e7f434bc5d69 from 6 configs: [{MachineConfig 00-worker machineconfiguration.openshift.io/v1 } {MachineConfig 01-worker-container-runtime machineconfiguration.openshift.io/v1 } {MachineConfig 01-worker-kubelet machineconfiguration.openshift.io/v1 } {MachineConfig 50-workers-chrony-configuration machineconfiguration.openshift.io/v1 } {MachineConfig 97-worker-generated-kubelet machineconfiguration.openshift.io/v1 } {MachineConfig 99-worker-ssh machineconfiguration.openshift.io/v1 }] 2026-03-20T08:37:12.851861669Z I0320 08:37:12.851767 1 event.go:377] Event(v1.ObjectReference{Kind:"MachineConfigPool", Namespace:"openshift-machine-config-operator", Name:"worker", UID:"71542f53-a8d0-43d8-baf2-58c92b237fee", APIVersion:"machineconfiguration.openshift.io/v1", ResourceVersion:"6773", FieldPath:""}): type: 'Normal' reason: 'RenderedConfigGenerated' rendered-worker-6c41cf327075224fbef5e7f434bc5d69 successfully generated (release version: 4.18.35, controller version: 393b8dc2c216dbbbf68cd1ccde5cbc2b551b2fe8) 2026-03-20T08:37:12.864766846Z I0320 08:37:12.864720 1 render_controller.go:586] Pool worker: now targeting: rendered-worker-6c41cf327075224fbef5e7f434bc5d69 2026-03-20T08:37:12.870566495Z I0320 08:37:12.870450 1 render_controller.go:394] Error syncing machineconfigpool worker: Operation cannot be fulfilled on machineconfigpools.machineconfiguration.openshift.io "worker": the object has been modified; please apply your changes to the latest version and try again 2026-03-20T08:37:12.910495820Z I0320 08:37:12.909617 1 render_controller.go:560] Generated machineconfig rendered-master-47246abc0cee5fbe972e47e23f330f37 from 12 configs: [{MachineConfig 00-master machineconfiguration.openshift.io/v1 } {MachineConfig 01-master-container-runtime machineconfiguration.openshift.io/v1 } {MachineConfig 01-master-kubelet machineconfiguration.openshift.io/v1 } {MachineConfig 50-master-dnsmasq-configuration machineconfiguration.openshift.io/v1 } {MachineConfig 50-masters-chrony-configuration machineconfiguration.openshift.io/v1 } {MachineConfig 90-master-nable-iscsi machineconfiguration.openshift.io/v1 } {MachineConfig 90-master-netifnames-conf machineconfiguration.openshift.io/v1 } {MachineConfig 91-master-lv-cinder-volumes machineconfiguration.openshift.io/v1 } {MachineConfig 91-master-multipath-conf machineconfiguration.openshift.io/v1 } {MachineConfig 97-master-generated-kubelet machineconfiguration.openshift.io/v1 } {MachineConfig 98-master-generated-kubelet machineconfiguration.openshift.io/v1 } {MachineConfig 99-master-ssh machineconfiguration.openshift.io/v1 }] 2026-03-20T08:37:12.910495820Z I0320 08:37:12.910158 1 event.go:377] Event(v1.ObjectReference{Kind:"MachineConfigPool", Namespace:"openshift-machine-config-operator", Name:"master", UID:"dd50c96a-d40c-49d6-9299-cdd3a16c9080", APIVersion:"machineconfiguration.openshift.io/v1", ResourceVersion:"6772", FieldPath:""}): type: 'Normal' reason: 'RenderedConfigGenerated' rendered-master-47246abc0cee5fbe972e47e23f330f37 successfully generated (release version: 4.18.35, controller version: 393b8dc2c216dbbbf68cd1ccde5cbc2b551b2fe8) 2026-03-20T08:37:12.919476143Z I0320 08:37:12.919413 1 render_controller.go:586] Pool master: now targeting: rendered-master-47246abc0cee5fbe972e47e23f330f37 2026-03-20T08:37:12.923776378Z I0320 08:37:12.923721 1 render_controller.go:394] Error syncing machineconfigpool master: Operation cannot be fulfilled on machineconfigpools.machineconfiguration.openshift.io "master": the object has been modified; please apply your changes to the latest version and try again 2026-03-20T08:37:12.994738699Z I0320 08:37:12.994628 1 container_runtime_config_controller.go:962] Applied ImageConfig cluster on MachineConfigPool worker 2026-03-20T08:37:14.356463637Z I0320 08:37:14.356358 1 container_runtime_config_controller.go:962] Applied ImageConfig cluster on MachineConfigPool master 2026-03-20T08:37:14.384088403Z I0320 08:37:14.384002 1 render_controller.go:394] Error syncing machineconfigpool worker: Operation cannot be fulfilled on machineconfigpools.machineconfiguration.openshift.io "worker": the object has been modified; please apply your changes to the latest version and try again 2026-03-20T08:37:14.426116400Z I0320 08:37:14.425937 1 kubelet_config_features.go:126] Applied FeatureSet cluster on MachineConfigPool master 2026-03-20T08:37:14.571047799Z I0320 08:37:14.570990 1 kubelet_config_features.go:126] Applied FeatureSet cluster on MachineConfigPool worker 2026-03-20T08:37:15.108315258Z I0320 08:37:15.107628 1 node_controller.go:606] Pool master: node master-0: changed annotation machineconfiguration.openshift.io/currentConfig = rendered-master-47246abc0cee5fbe972e47e23f330f37 2026-03-20T08:37:15.108315258Z I0320 08:37:15.107688 1 node_controller.go:606] Pool master: node master-0: changed annotation machineconfiguration.openshift.io/desiredConfig = rendered-master-47246abc0cee5fbe972e47e23f330f37 2026-03-20T08:37:15.108315258Z I0320 08:37:15.107700 1 node_controller.go:606] Pool master: node master-0: changed annotation machineconfiguration.openshift.io/state = Done 2026-03-20T08:37:15.108315258Z I0320 08:37:15.107901 1 event.go:377] Event(v1.ObjectReference{Kind:"MachineConfigPool", Namespace:"openshift-machine-config-operator", Name:"master", UID:"dd50c96a-d40c-49d6-9299-cdd3a16c9080", APIVersion:"machineconfiguration.openshift.io/v1", ResourceVersion:"8331", FieldPath:""}): type: 'Normal' reason: 'AnnotationChange' Node master-0 now has machineconfiguration.openshift.io/currentConfig=rendered-master-47246abc0cee5fbe972e47e23f330f37 2026-03-20T08:37:15.108315258Z I0320 08:37:15.107976 1 event.go:377] Event(v1.ObjectReference{Kind:"MachineConfigPool", Namespace:"openshift-machine-config-operator", Name:"master", UID:"dd50c96a-d40c-49d6-9299-cdd3a16c9080", APIVersion:"machineconfiguration.openshift.io/v1", ResourceVersion:"8331", FieldPath:""}): type: 'Normal' reason: 'AnnotationChange' Node master-0 now has machineconfiguration.openshift.io/desiredConfig=rendered-master-47246abc0cee5fbe972e47e23f330f37 2026-03-20T08:37:15.108315258Z I0320 08:37:15.107994 1 event.go:377] Event(v1.ObjectReference{Kind:"MachineConfigPool", Namespace:"openshift-machine-config-operator", Name:"master", UID:"dd50c96a-d40c-49d6-9299-cdd3a16c9080", APIVersion:"machineconfiguration.openshift.io/v1", ResourceVersion:"8331", FieldPath:""}): type: 'Normal' reason: 'AnnotationChange' Node master-0 now has machineconfiguration.openshift.io/state=Done 2026-03-20T08:37:20.392541597Z I0320 08:37:20.388897 1 node_controller.go:1219] Updated controlPlaneTopology annotation of node master-0 from to 2026-03-20T08:37:20.399697706Z I0320 08:37:20.397769 1 status.go:267] Pool worker: All nodes are updated with MachineConfig rendered-worker-6c41cf327075224fbef5e7f434bc5d69 2026-03-20T08:37:20.508665246Z I0320 08:37:20.508443 1 status.go:267] Pool master: All nodes are updated with MachineConfig rendered-master-47246abc0cee5fbe972e47e23f330f37 2026-03-20T08:37:20.572316163Z I0320 08:37:20.572244 1 node_controller.go:899] Error syncing machineconfigpool master: could not update MachineConfigPool "master": Operation cannot be fulfilled on machineconfigpools.machineconfiguration.openshift.io "master": the object has been modified; please apply your changes to the latest version and try again 2026-03-20T08:37:20.637723701Z E0320 08:37:20.637605 1 render_controller.go:464] Error syncing Generated MCFG: Operation cannot be fulfilled on machineconfigpools.machineconfiguration.openshift.io "worker": the object has been modified; please apply your changes to the latest version and try again 2026-03-20T08:37:20.646152337Z E0320 08:37:20.645731 1 render_controller.go:486] Error updating MachineConfigPool worker: Operation cannot be fulfilled on machineconfigpools.machineconfiguration.openshift.io "worker": the object has been modified; please apply your changes to the latest version and try again 2026-03-20T08:37:20.646152337Z I0320 08:37:20.645760 1 render_controller.go:394] Error syncing machineconfigpool worker: Operation cannot be fulfilled on machineconfigpools.machineconfiguration.openshift.io "worker": the object has been modified; please apply your changes to the latest version and try again 2026-03-20T08:37:20.732311891Z I0320 08:37:20.732144 1 status.go:267] Pool master: All nodes are updated with MachineConfig rendered-master-47246abc0cee5fbe972e47e23f330f37 2026-03-20T08:37:36.825455522Z I0320 08:37:36.825348 1 drain_controller.go:183] node master-0: uncordoning 2026-03-20T08:37:36.825455522Z I0320 08:37:36.825432 1 drain_controller.go:183] node master-0: initiating uncordon (currently schedulable: true) 2026-03-20T08:38:36.828812922Z E0320 08:38:36.828755 1 drain_controller.go:554] Failed to fetch node the server was unable to return a response in the time allotted, but may still be processing the request (get nodes master-0), retrying 2026-03-20T08:38:41.478211384Z E0320 08:38:41.478121 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-20T08:38:46.829335073Z I0320 08:38:46.828875 1 drain_controller.go:183] node master-0: initiating uncordon (currently schedulable: true) 2026-03-20T08:38:46.835802432Z I0320 08:38:46.835738 1 drain_controller.go:183] node master-0: uncordon succeeded (currently schedulable: true) 2026-03-20T08:38:46.835802432Z I0320 08:38:46.835771 1 drain_controller.go:183] node master-0: operation successful; applying completion annotation 2026-03-20T08:38:51.962715220Z I0320 08:38:51.962631 1 node_controller.go:606] Pool master: node master-0: changed annotation machineconfiguration.openshift.io/reason = 2026-03-20T08:38:51.963083180Z I0320 08:38:51.963048 1 event.go:377] Event(v1.ObjectReference{Kind:"MachineConfigPool", Namespace:"openshift-machine-config-operator", Name:"master", UID:"dd50c96a-d40c-49d6-9299-cdd3a16c9080", APIVersion:"machineconfiguration.openshift.io/v1", ResourceVersion:"8431", FieldPath:""}): type: 'Normal' reason: 'AnnotationChange' Node master-0 now has machineconfiguration.openshift.io/reason= kube-rbac-proxy-crio_current.log0000640000000000000000000000576015157203665034476 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/kube-rbac-proxy-crio-master-02026-03-20T08:34:37.927042942Z W0320 08:34:37.926742 1 deprecated.go:66] 2026-03-20T08:34:37.927042942Z ==== Removed Flag Warning ====================== 2026-03-20T08:34:37.927042942Z 2026-03-20T08:34:37.927042942Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-20T08:34:37.927042942Z 2026-03-20T08:34:37.927042942Z =============================================== 2026-03-20T08:34:37.927042942Z 2026-03-20T08:34:37.927042942Z I0320 08:34:37.926905 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg 2026-03-20T08:34:37.931301680Z I0320 08:34:37.931242 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-20T08:34:37.931791895Z I0320 08:34:37.931682 1 dynamic_cafile_content.go:160] "Starting controller" name="client-ca::/etc/kubernetes/kubelet-ca.crt" 2026-03-20T08:34:37.933312291Z I0320 08:34:37.933258 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-20T08:34:37.933682232Z I0320 08:34:37.933627 1 kube-rbac-proxy.go:395] Starting TCP socket on :9637 2026-03-20T08:34:37.934354022Z I0320 08:34:37.934301 1 kube-rbac-proxy.go:402] Listening securely on :9637 2026-03-20T08:37:10.990175630Z I0320 08:37:10.990096 1 dynamic_cafile_content.go:214] "Failed to remove file watch, it may have been deleted" file="/etc/kubernetes/kubelet-ca.crt" err="fsnotify: can't remove non-existent watch: /etc/kubernetes/kubelet-ca.crt" 2026-03-20T08:37:11.548300358Z I0320 08:37:11.545400 1 dynamic_cafile_content.go:214] "Failed to remove file watch, it may have been deleted" file="/etc/kubernetes/kubelet-ca.crt" err="fsnotify: can't remove non-existent watch: /etc/kubernetes/kubelet-ca.crt" 2026-03-20T08:37:11.647330008Z I0320 08:37:11.646243 1 dynamic_cafile_content.go:214] "Failed to remove file watch, it may have been deleted" file="/etc/kubernetes/kubelet-ca.crt" err="fsnotify: can't remove non-existent watch: /etc/kubernetes/kubelet-ca.crt" 2026-03-20T08:37:12.715768408Z I0320 08:37:12.715070 1 dynamic_cafile_content.go:214] "Failed to remove file watch, it may have been deleted" file="/etc/kubernetes/kubelet-ca.crt" err="fsnotify: can't remove non-existent watch: /etc/kubernetes/kubelet-ca.crt" 2026-03-20T08:37:27.976434284Z I0320 08:37:27.976331 1 dynamic_cafile_content.go:214] "Failed to remove file watch, it may have been deleted" file="/etc/kubernetes/kubelet-ca.crt" err="fsnotify: can't remove non-existent watch: /etc/kubernetes/kubelet-ca.crt" 2026-03-20T08:37:27.997237031Z I0320 08:37:27.997067 1 dynamic_cafile_content.go:214] "Failed to remove file watch, it may have been deleted" file="/etc/kubernetes/kubelet-ca.crt" err="fsnotify: can't remove non-existent watch: /etc/kubernetes/kubelet-ca.crt" 2026-03-20T08:37:29.768206103Z I0320 08:37:29.581360 1 dynamic_cafile_content.go:214] "Failed to remove file watch, it may have been deleted" file="/etc/kubernetes/kubelet-ca.crt" err="fsnotify: can't remove non-existent watch: /etc/kubernetes/kubelet-ca.crt" config/pod/openshift-machine-config-operator/logs/kube-rbac-proxy-crio-master-0/setup_current.log0000640000000000000000000000012615157203665031740 0ustar00000000000000002026-03-20T08:33:52.330034885Z Waiting for kubelet key and certificate to be availablekube-rbac-proxy-crio_previous.log0000640000000000000000000000221015157203665034653 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/kube-rbac-proxy-crio-master-02026-03-20T08:34:07.949489105Z W0320 08:34:07.949216 1 deprecated.go:66] 2026-03-20T08:34:07.949489105Z ==== Removed Flag Warning ====================== 2026-03-20T08:34:07.949489105Z 2026-03-20T08:34:07.949489105Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-20T08:34:07.949489105Z 2026-03-20T08:34:07.949489105Z =============================================== 2026-03-20T08:34:07.949489105Z 2026-03-20T08:34:07.949489105Z I0320 08:34:07.949403 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg 2026-03-20T08:34:07.950790954Z E0320 08:34:07.950742 1 run.go:72] "command failed" err="failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]" config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001521215157203665026264 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"fd641d68-095b-4e36-89b4-c928e83f81a6","resourceVersion":"4016","creationTimestamp":"2026-03-20T08:35:59Z","labels":{"k8s-app":"kube-rbac-proxy-crio"},"annotations":{"kubernetes.io/config.hash":"1249822f86f23526277d165c0d5d3c19","kubernetes.io/config.mirror":"1249822f86f23526277d165c0d5d3c19","kubernetes.io/config.seen":"2026-03-20T08:33:49.482948580Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"7bc50120-3879-4454-8162-ec2f348aada5","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:14Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:14Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:14Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:14Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:14Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-20T08:36:14Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-20T08:33:52Z","finishedAt":"2026-03-20T08:33:52Z","containerID":"cri-o://9f89ba02fad31edac59462f307fd61765f540c624fde9c9ab1bb13b80a642b0c"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://9f89ba02fad31edac59462f307fd61765f540c624fde9c9ab1bb13b80a642b0c","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-03-20T08:34:37Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0320 08:34:07.949216 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0320 08:34:07.949403 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0320 08:34:07.950742 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-03-20T08:34:07Z","finishedAt":"2026-03-20T08:34:07Z","containerID":"cri-o://96ff83659a940b2334d29c8de766dce2f56c0eddae2926cc1d3dd2e347430a94"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://879adddb20c3ea4126b46482343a718dc4153b404d31f5e2d5d624d657e93169","started":true}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000010070715157203665043002 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-dddff6458-vx5d72026-03-20T08:36:59.710171169Z I0320 08:36:59.710116 1 request.go:700] Waited for 1.131022795s due to client-side throttling, not priority and fairness, request: POST:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/configmaps 2026-03-20T08:36:59.717894414Z I0320 08:36:59.717849 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:36:59.717974206Z I0320 08:36:59.717939 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"3c0a7817-a5ea-4806-80c4-6f415f47e0e6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing 2026-03-20T08:37:00.859380996Z I0320 08:37:00.857421 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"3c0a7817-a5ea-4806-80c4-6f415f47e0e6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing 2026-03-20T08:37:00.910114107Z I0320 08:37:00.910012 1 request.go:700] Waited for 1.191866153s due to client-side throttling, not priority and fairness, request: POST:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/configmaps 2026-03-20T08:37:00.916306798Z I0320 08:37:00.916238 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:37:00.916306798Z I0320 08:37:00.916243 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"3c0a7817-a5ea-4806-80c4-6f415f47e0e6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing 2026-03-20T08:37:01.720108615Z I0320 08:37:01.717102 1 installer_controller.go:550] "master-0" is in transition to 1, but has not made progress because installer is not finished, but in Pending phase 2026-03-20T08:37:01.910645035Z I0320 08:37:01.910558 1 request.go:700] Waited for 1.052726752s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/openshift-kube-scheduler-master-0 2026-03-20T08:37:02.394360261Z I0320 08:37:02.394007 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:37:02.396308758Z I0320 08:37:02.394638 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"3c0a7817-a5ea-4806-80c4-6f415f47e0e6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing 2026-03-20T08:37:02.914553901Z I0320 08:37:02.910881 1 request.go:700] Waited for 1.182770906s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-1-master-0 2026-03-20T08:37:03.358269600Z I0320 08:37:03.325671 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:37:03.358269600Z I0320 08:37:03.325836 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"3c0a7817-a5ea-4806-80c4-6f415f47e0e6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing 2026-03-20T08:37:04.111776389Z I0320 08:37:04.110675 1 request.go:700] Waited for 1.165651738s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-1-master-0 2026-03-20T08:37:04.115837468Z I0320 08:37:04.115481 1 installer_controller.go:550] "master-0" is in transition to 1, but has not made progress because installer is not finished, but in Pending phase 2026-03-20T08:37:04.517910462Z I0320 08:37:04.517812 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:37:04.522372162Z I0320 08:37:04.522278 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"3c0a7817-a5ea-4806-80c4-6f415f47e0e6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing 2026-03-20T08:37:05.114375108Z I0320 08:37:05.113114 1 request.go:700] Waited for 1.389402317s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/localhost-recovery-client 2026-03-20T08:37:05.519312506Z I0320 08:37:05.519159 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"3c0a7817-a5ea-4806-80c4-6f415f47e0e6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing 2026-03-20T08:37:06.310756401Z I0320 08:37:06.310665 1 request.go:700] Waited for 1.370844874s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa 2026-03-20T08:37:07.088737295Z I0320 08:37:07.088363 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"3c0a7817-a5ea-4806-80c4-6f415f47e0e6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing 2026-03-20T08:37:07.103705372Z I0320 08:37:07.103441 1 installer_controller.go:550] "master-0" is in transition to 1, but has not made progress because installer is not finished, but in Running phase 2026-03-20T08:37:07.511293487Z I0320 08:37:07.511075 1 request.go:700] Waited for 1.395436972s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/configmaps/config 2026-03-20T08:37:07.730355750Z I0320 08:37:07.730282 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:37:07.730355750Z I0320 08:37:07.730318 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"3c0a7817-a5ea-4806-80c4-6f415f47e0e6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RevisionTriggered' new revision 2 triggered by "required configmap/serviceaccount-ca has changed" 2026-03-20T08:37:07.753894217Z I0320 08:37:07.753820 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:37:08.541050168Z I0320 08:37:08.540719 1 request.go:700] Waited for 1.023891781s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/configmaps/serviceaccount-ca 2026-03-20T08:37:09.059323603Z I0320 08:37:09.058223 1 installer_controller.go:550] "master-0" is in transition to 1, but has not made progress because installer is not finished, but in Running phase 2026-03-20T08:37:11.119245946Z I0320 08:37:11.112330 1 installer_controller.go:540] "master-0" moving to (v1.NodeStatus) { 2026-03-20T08:37:11.119245946Z NodeName: (string) (len=8) "master-0", 2026-03-20T08:37:11.119245946Z CurrentRevision: (int32) 0, 2026-03-20T08:37:11.119245946Z TargetRevision: (int32) 2, 2026-03-20T08:37:11.119245946Z LastFailedRevision: (int32) 0, 2026-03-20T08:37:11.119245946Z LastFailedTime: (*v1.Time)(), 2026-03-20T08:37:11.119245946Z LastFailedReason: (string) "", 2026-03-20T08:37:11.119245946Z LastFailedCount: (int) 0, 2026-03-20T08:37:11.119245946Z LastFallbackCount: (int) 0, 2026-03-20T08:37:11.119245946Z LastFailedRevisionErrors: ([]string) 2026-03-20T08:37:11.119245946Z } 2026-03-20T08:37:11.119245946Z because new revision pending 2026-03-20T08:37:11.119245946Z W0320 08:37:11.113617 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-03-20T08:37:11.119245946Z W0320 08:37:11.113631 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-03-20T08:37:11.119245946Z W0320 08:37:11.113635 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-20T08:37:11.119245946Z W0320 08:37:11.113639 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-20T08:37:11.119245946Z W0320 08:37:11.113642 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-20T08:37:11.479001875Z I0320 08:37:11.476281 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:37:11.479266623Z I0320 08:37:11.479043 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-20T08:36:58Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-20T08:36:42Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-20T08:37:11.571229897Z I0320 08:37:11.570481 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"3c0a7817-a5ea-4806-80c4-6f415f47e0e6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: Progressing message changed from "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1" to "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2",Available message changed from "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1" to "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2" 2026-03-20T08:37:12.524677301Z I0320 08:37:12.522979 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"3c0a7817-a5ea-4806-80c4-6f415f47e0e6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing 2026-03-20T08:37:14.051342363Z I0320 08:37:14.039216 1 request.go:700] Waited for 1.516502685s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-2-master-0 2026-03-20T08:37:14.064253640Z I0320 08:37:14.064078 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-03-20T08:37:15.514365418Z I0320 08:37:15.514302 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-03-20T08:37:20.531847792Z I0320 08:37:20.531779 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-03-20T08:37:26.215214428Z I0320 08:37:26.215112 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-03-20T08:38:16.301514889Z E0320 08:38:16.301406 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-20T08:38:42.531500632Z E0320 08:38:42.531431 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-InstallerState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" 2026-03-20T08:38:42.550844887Z I0320 08:38:42.550758 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:38:42.551842236Z I0320 08:38:42.551795 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-kube-scheduler-master-0)\nNodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-20T08:36:58Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-20T08:36:42Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-20T08:38:46.559246351Z W0320 08:38:46.557632 1 dynamic_operator_client.go:352] .status.conditions["StaticPodsDegraded"].reason is missing; this will eventually be fatal 2026-03-20T08:38:46.559246351Z W0320 08:38:46.557676 1 dynamic_operator_client.go:355] .status.conditions["StaticPodsDegraded"].message is missing; this will eventually be fatal 2026-03-20T08:38:46.567925595Z I0320 08:38:46.566751 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-03-20T08:38:46.599365422Z I0320 08:38:46.599287 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:38:46.628259785Z I0320 08:38:46.626101 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-03-20T08:38:46.659536348Z I0320 08:38:46.659443 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-03-20T08:38:47.165982378Z I0320 08:38:47.165764 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-03-20T08:38:47.649795887Z E0320 08:38:47.649634 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: \"manifests/installer-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)" 2026-03-20T08:38:47.651594809Z I0320 08:38:47.651546 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:38:48.165879348Z W0320 08:38:48.165795 1 dynamic_operator_client.go:355] .status.conditions["BackingResourceControllerDegraded"].message is missing; this will eventually be fatal 2026-03-20T08:38:48.186424807Z I0320 08:38:48.186380 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:38:48.562957736Z I0320 08:38:48.562831 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-03-20T08:38:49.963273111Z I0320 08:38:49.963207 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-03-20T08:38:50.180516220Z I0320 08:38:50.179762 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:38:50.180516220Z E0320 08:38:50.180482 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: \"assets/kube-scheduler/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-scheduler)" 2026-03-20T08:38:51.512087479Z I0320 08:38:51.511979 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"3c0a7817-a5ea-4806-80c4-6f415f47e0e6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready" to "StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-kube-scheduler-master-0)\nNodeControllerDegraded: All master nodes are ready" 2026-03-20T08:38:51.514620043Z I0320 08:38:51.513167 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-scheduler)\nKubeControllerManagerStaticResourcesDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-20T08:36:58Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-20T08:36:42Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-20T08:38:51.525676646Z E0320 08:38:51.525328 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_kube-scheduler reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"kube-scheduler\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-20T08:38:51.533373380Z I0320 08:38:51.533317 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-scheduler)\nKubeControllerManagerStaticResourcesDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-20T08:36:58Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-20T08:36:42Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-20T08:38:51.545941947Z E0320 08:38:51.544011 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_kube-scheduler reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"kube-scheduler\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-20T08:38:51.558288487Z I0320 08:38:51.557796 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-scheduler)\nKubeControllerManagerStaticResourcesDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-20T08:36:58Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-20T08:36:42Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-20T08:38:51.565793056Z I0320 08:38:51.565400 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-03-20T08:38:51.569770432Z I0320 08:38:51.568303 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"3c0a7817-a5ea-4806-80c4-6f415f47e0e6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: Degraded message changed from "StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-kube-scheduler-master-0)\nNodeControllerDegraded: All master nodes are ready" to "NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-scheduler)\nKubeControllerManagerStaticResourcesDegraded: " 2026-03-20T08:38:51.569770432Z I0320 08:38:51.568445 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-scheduler)\nKubeControllerManagerStaticResourcesDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-20T08:36:58Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-20T08:36:42Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-20T08:38:51.575505800Z E0320 08:38:51.575009 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_kube-scheduler reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"kube-scheduler\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-20T08:38:52.363801145Z W0320 08:38:52.363717 1 dynamic_operator_client.go:355] .status.conditions["KubeControllerManagerStaticResourcesDegraded"].message is missing; this will eventually be fatal 2026-03-20T08:38:52.386371833Z I0320 08:38:52.384392 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:38:52.386371833Z I0320 08:38:52.385069 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-20T08:36:58Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-20T08:36:42Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-20T08:38:52.393461060Z I0320 08:38:52.393418 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"3c0a7817-a5ea-4806-80c4-6f415f47e0e6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-scheduler)\nKubeControllerManagerStaticResourcesDegraded: " to "NodeControllerDegraded: All master nodes are ready" 2026-03-20T08:38:53.597602681Z E0320 08:38:53.597296 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: synthetic requeue request" 2026-03-20T08:38:53.610715533Z I0320 08:38:53.607132 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"NodeControllerDegraded: All master nodes are ready\nTargetConfigControllerDegraded: \"configmap\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-20T08:36:58Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-20T08:36:42Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-20T08:38:53.645365754Z I0320 08:38:53.643062 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:38:53.645365754Z I0320 08:38:53.643757 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"3c0a7817-a5ea-4806-80c4-6f415f47e0e6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready" to "NodeControllerDegraded: All master nodes are ready\nTargetConfigControllerDegraded: \"configmap\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)" 2026-03-20T08:38:53.964986521Z I0320 08:38:53.964901 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-03-20T08:38:55.564016815Z I0320 08:38:55.563907 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-03-20T08:38:57.681107727Z I0320 08:38:57.681044 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:38:57.682852958Z I0320 08:38:57.682751 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-20T08:36:58Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-20T08:36:42Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-20T08:36:42Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-20T08:38:57.775065379Z I0320 08:38:57.773249 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"3c0a7817-a5ea-4806-80c4-6f415f47e0e6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nTargetConfigControllerDegraded: \"configmap\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)" to "NodeControllerDegraded: All master nodes are ready" 2026-03-20T08:38:59.163792286Z I0320 08:38:59.163682 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-03-20T08:39:09.827808101Z I0320 08:39:09.826884 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-03-20T08:39:11.425066754Z I0320 08:39:11.424970 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase config/pod/openshift-kube-scheduler/logs/installer-2-master-0/installer_current.log0000640000000000000000000001303315157203665027170 0ustar00000000000000002026-03-20T08:37:39.792503498Z I0320 08:37:39.792076 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc000874dc0 cert-secrets:0xc000874b40 configmaps:0xc0008746e0 namespace:0xc000874500 optional-configmaps:0xc000874820 optional-secrets:0xc000874780 pod:0xc0008745a0 pod-manifest-dir:0xc000874960 resource-dir:0xc0008748c0 revision:0xc000874460 secrets:0xc000874640 v:0xc0008757c0] [0xc0008757c0 0xc000874460 0xc000874500 0xc0008745a0 0xc0008748c0 0xc000874960 0xc0008746e0 0xc000874820 0xc000874780 0xc000874640 0xc000874dc0 0xc000874b40] [] map[cert-configmaps:0xc000874be0 cert-dir:0xc000874dc0 cert-secrets:0xc000874b40 configmaps:0xc0008746e0 help:0xc000875b80 kubeconfig:0xc0008743c0 log-flush-frequency:0xc000875720 namespace:0xc000874500 optional-cert-configmaps:0xc000874d20 optional-cert-secrets:0xc000874c80 optional-configmaps:0xc000874820 optional-secrets:0xc000874780 pod:0xc0008745a0 pod-manifest-dir:0xc000874960 pod-manifests-lock-file:0xc000874aa0 resource-dir:0xc0008748c0 revision:0xc000874460 secrets:0xc000874640 timeout-duration:0xc000874a00 v:0xc0008757c0 vmodule:0xc000875860] [0xc0008743c0 0xc000874460 0xc000874500 0xc0008745a0 0xc000874640 0xc0008746e0 0xc000874780 0xc000874820 0xc0008748c0 0xc000874960 0xc000874a00 0xc000874aa0 0xc000874b40 0xc000874be0 0xc000874c80 0xc000874d20 0xc000874dc0 0xc000875720 0xc0008757c0 0xc000875860 0xc000875b80] [0xc000874be0 0xc000874dc0 0xc000874b40 0xc0008746e0 0xc000875b80 0xc0008743c0 0xc000875720 0xc000874500 0xc000874d20 0xc000874c80 0xc000874820 0xc000874780 0xc0008745a0 0xc000874960 0xc000874aa0 0xc0008748c0 0xc000874460 0xc000874640 0xc000874a00 0xc0008757c0 0xc000875860] map[104:0xc000875b80 118:0xc0008757c0] [] -1 0 0xc000605050 true 0x223dac0 []} 2026-03-20T08:37:39.792503498Z I0320 08:37:39.792435 1 cmd.go:96] (*installerpod.InstallOptions)(0xc00053a1a0)({ 2026-03-20T08:37:39.792503498Z KubeConfig: (string) "", 2026-03-20T08:37:39.792503498Z KubeClient: (kubernetes.Interface) , 2026-03-20T08:37:39.792503498Z Revision: (string) (len=1) "2", 2026-03-20T08:37:39.792503498Z NodeName: (string) "", 2026-03-20T08:37:39.792503498Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-03-20T08:37:39.792503498Z Clock: (clock.RealClock) { 2026-03-20T08:37:39.792503498Z }, 2026-03-20T08:37:39.792503498Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-03-20T08:37:39.792503498Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-20T08:37:39.792503498Z (string) (len=31) "localhost-recovery-client-token" 2026-03-20T08:37:39.792503498Z }, 2026-03-20T08:37:39.792503498Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-20T08:37:39.792503498Z (string) (len=12) "serving-cert" 2026-03-20T08:37:39.792503498Z }, 2026-03-20T08:37:39.792503498Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-03-20T08:37:39.792503498Z (string) (len=18) "kube-scheduler-pod", 2026-03-20T08:37:39.792503498Z (string) (len=6) "config", 2026-03-20T08:37:39.792503498Z (string) (len=17) "serviceaccount-ca", 2026-03-20T08:37:39.792503498Z (string) (len=20) "scheduler-kubeconfig", 2026-03-20T08:37:39.792503498Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-03-20T08:37:39.792503498Z }, 2026-03-20T08:37:39.792503498Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-20T08:37:39.792503498Z (string) (len=16) "policy-configmap" 2026-03-20T08:37:39.792503498Z }, 2026-03-20T08:37:39.792503498Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-03-20T08:37:39.792503498Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-03-20T08:37:39.792503498Z }, 2026-03-20T08:37:39.792503498Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-20T08:37:39.792503498Z CertConfigMapNamePrefixes: ([]string) , 2026-03-20T08:37:39.792503498Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-03-20T08:37:39.792503498Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-03-20T08:37:39.792503498Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-20T08:37:39.792503498Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-20T08:37:39.792503498Z Timeout: (time.Duration) 2m0s, 2026-03-20T08:37:39.792503498Z StaticPodManifestsLockFile: (string) "", 2026-03-20T08:37:39.792503498Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-20T08:37:39.792503498Z KubeletVersion: (string) "" 2026-03-20T08:37:39.792503498Z }) 2026-03-20T08:37:39.883781762Z I0320 08:37:39.793428 1 cmd.go:413] Getting controller reference for node master-0 2026-03-20T08:38:36.124537959Z W0320 08:38:36.124377 1 cmd.go:423] unable to get owner reference (falling back to namespace): Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-2-master-0?timeout=14s": context deadline exceeded 2026-03-20T08:38:36.124537959Z I0320 08:38:36.124448 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-20T08:38:36.124537959Z I0320 08:38:36.124507 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-20T08:38:36.124537959Z I0320 08:38:36.124517 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-20T08:38:46.632267902Z I0320 08:38:46.632117 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-03-20T08:38:56.636860374Z I0320 08:38:56.636794 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000004134615157203665030237 0ustar00000000000000002026-03-20T08:38:50.800030884Z weight: 0 2026-03-20T08:38:50.800030884Z - name: TaintToleration 2026-03-20T08:38:50.800030884Z weight: 3 2026-03-20T08:38:50.800030884Z - name: NodeAffinity 2026-03-20T08:38:50.800030884Z weight: 2 2026-03-20T08:38:50.800030884Z - name: NodePorts 2026-03-20T08:38:50.800030884Z weight: 0 2026-03-20T08:38:50.800030884Z - name: NodeResourcesFit 2026-03-20T08:38:50.800030884Z weight: 1 2026-03-20T08:38:50.800030884Z - name: VolumeRestrictions 2026-03-20T08:38:50.800030884Z weight: 0 2026-03-20T08:38:50.800030884Z - name: NodeVolumeLimits 2026-03-20T08:38:50.800030884Z weight: 0 2026-03-20T08:38:50.800030884Z - name: VolumeBinding 2026-03-20T08:38:50.800030884Z weight: 0 2026-03-20T08:38:50.800030884Z - name: VolumeZone 2026-03-20T08:38:50.800030884Z weight: 0 2026-03-20T08:38:50.800030884Z - name: PodTopologySpread 2026-03-20T08:38:50.800030884Z weight: 2 2026-03-20T08:38:50.800030884Z - name: InterPodAffinity 2026-03-20T08:38:50.800030884Z weight: 2 2026-03-20T08:38:50.800030884Z - name: DefaultPreemption 2026-03-20T08:38:50.800030884Z weight: 0 2026-03-20T08:38:50.800030884Z - name: NodeResourcesBalancedAllocation 2026-03-20T08:38:50.800030884Z weight: 1 2026-03-20T08:38:50.800030884Z - name: ImageLocality 2026-03-20T08:38:50.800030884Z weight: 1 2026-03-20T08:38:50.800030884Z - name: DefaultBinder 2026-03-20T08:38:50.800030884Z weight: 0 2026-03-20T08:38:50.800030884Z permit: {} 2026-03-20T08:38:50.800030884Z postBind: {} 2026-03-20T08:38:50.800030884Z postFilter: {} 2026-03-20T08:38:50.800030884Z preBind: {} 2026-03-20T08:38:50.800030884Z preEnqueue: {} 2026-03-20T08:38:50.800030884Z preFilter: {} 2026-03-20T08:38:50.800030884Z preScore: {} 2026-03-20T08:38:50.800030884Z queueSort: {} 2026-03-20T08:38:50.800030884Z reserve: {} 2026-03-20T08:38:50.800030884Z score: {} 2026-03-20T08:38:50.800030884Z schedulerName: default-scheduler 2026-03-20T08:38:50.800030884Z > 2026-03-20T08:38:50.801888549Z I0320 08:38:50.801848 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-03-20T08:38:50.801979941Z I0320 08:38:50.801964 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-03-20T08:38:50.826221059Z I0320 08:38:50.826142 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773995871\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773995871\" (2026-03-20 07:37:51 +0000 UTC to 2027-03-20 07:37:51 +0000 UTC (now=2026-03-20 08:38:50.826114196 +0000 UTC))" 2026-03-20T08:38:50.826440056Z I0320 08:38:50.826400 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773995872\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773995871\" (2026-03-20 07:37:51 +0000 UTC to 2029-03-20 07:37:51 +0000 UTC (now=2026-03-20 08:38:50.826388054 +0000 UTC))" 2026-03-20T08:38:50.826499447Z I0320 08:38:50.826487 1 secure_serving.go:213] Serving securely on [::]:10259 2026-03-20T08:38:50.826621721Z I0320 08:38:50.826610 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-20T08:38:50.826676242Z I0320 08:38:50.826667 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-20T08:38:50.826717544Z I0320 08:38:50.826706 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2026-03-20T08:38:50.826852458Z I0320 08:38:50.826840 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-20T08:38:50.843329499Z I0320 08:38:50.832849 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-20T08:38:50.843329499Z I0320 08:38:50.833699 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-20T08:38:50.843329499Z I0320 08:38:50.832943 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-20T08:38:50.843329499Z I0320 08:38:50.841218 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-20T08:38:50.853276759Z I0320 08:38:50.853175 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-20T08:38:50.854657300Z I0320 08:38:50.854630 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:50.855003550Z I0320 08:38:50.854792 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:50.855928547Z I0320 08:38:50.855038 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:50.855928547Z I0320 08:38:50.855271 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:50.855928547Z I0320 08:38:50.855438 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:50.855928547Z I0320 08:38:50.855599 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:50.859350987Z I0320 08:38:50.858093 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-20T08:38:50.859350987Z I0320 08:38:50.858175 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-20T08:38:50.869687249Z I0320 08:38:50.869646 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:50.869924306Z I0320 08:38:50.869908 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:50.872822480Z I0320 08:38:50.870253 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:50.876087846Z I0320 08:38:50.876029 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:50.884668656Z I0320 08:38:50.884603 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:50.884923844Z I0320 08:38:50.884896 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:50.885022927Z I0320 08:38:50.884989 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:50.885208952Z I0320 08:38:50.885178 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-20T08:38:50.885313035Z I0320 08:38:50.885289 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:50.893716950Z I0320 08:38:50.893639 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:50.929628049Z I0320 08:38:50.929384 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-20T08:38:50.929628049Z I0320 08:38:50.929530 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-03-20T08:38:50.934260555Z I0320 08:38:50.934179 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-20T08:38:50.934616975Z I0320 08:38:50.934576 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-20 08:18:48 +0000 UTC to 2036-03-17 08:18:48 +0000 UTC (now=2026-03-20 08:38:50.934546793 +0000 UTC))" 2026-03-20T08:38:50.934628135Z I0320 08:38:50.934614 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-20 08:25:35 +0000 UTC to 2026-03-21 08:25:35 +0000 UTC (now=2026-03-20 08:38:50.934609605 +0000 UTC))" 2026-03-20T08:38:50.934637966Z I0320 08:38:50.934628 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-20 08:25:35 +0000 UTC to 2027-03-20 08:25:35 +0000 UTC (now=2026-03-20 08:38:50.934624445 +0000 UTC))" 2026-03-20T08:38:50.934650726Z I0320 08:38:50.934640 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-20 08:25:35 +0000 UTC to 2027-03-20 08:25:35 +0000 UTC (now=2026-03-20 08:38:50.934636616 +0000 UTC))" 2026-03-20T08:38:50.934663116Z I0320 08:38:50.934651 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-20 08:25:32 +0000 UTC to 2036-03-17 08:25:32 +0000 UTC (now=2026-03-20 08:38:50.934647786 +0000 UTC))" 2026-03-20T08:38:50.934818471Z I0320 08:38:50.934783 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773995871\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773995871\" (2026-03-20 07:37:51 +0000 UTC to 2027-03-20 07:37:51 +0000 UTC (now=2026-03-20 08:38:50.93477635 +0000 UTC))" 2026-03-20T08:38:50.934909153Z I0320 08:38:50.934887 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773995872\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773995871\" (2026-03-20 07:37:51 +0000 UTC to 2029-03-20 07:37:51 +0000 UTC (now=2026-03-20 08:38:50.934879863 +0000 UTC))" 2026-03-20T08:38:50.944526044Z I0320 08:38:50.944430 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-20T08:38:50.944951047Z I0320 08:38:50.944890 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-20 08:18:48 +0000 UTC to 2036-03-17 08:18:48 +0000 UTC (now=2026-03-20 08:38:50.944860884 +0000 UTC))" 2026-03-20T08:38:50.944951047Z I0320 08:38:50.944933 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-20 08:25:35 +0000 UTC to 2026-03-21 08:25:35 +0000 UTC (now=2026-03-20 08:38:50.944928056 +0000 UTC))" 2026-03-20T08:38:50.944964097Z I0320 08:38:50.944951 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-20 08:25:35 +0000 UTC to 2027-03-20 08:25:35 +0000 UTC (now=2026-03-20 08:38:50.944946557 +0000 UTC))" 2026-03-20T08:38:50.944972177Z I0320 08:38:50.944963 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-20 08:25:35 +0000 UTC to 2027-03-20 08:25:35 +0000 UTC (now=2026-03-20 08:38:50.944958967 +0000 UTC))" 2026-03-20T08:38:50.944985708Z I0320 08:38:50.944975 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-20 08:25:32 +0000 UTC to 2036-03-17 08:25:32 +0000 UTC (now=2026-03-20 08:38:50.944971157 +0000 UTC))" 2026-03-20T08:38:50.945013719Z I0320 08:38:50.944990 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-20 08:25:32 +0000 UTC to 2026-03-21 08:25:32 +0000 UTC (now=2026-03-20 08:38:50.944985948 +0000 UTC))" 2026-03-20T08:38:50.945178383Z I0320 08:38:50.945141 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773995871\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773995871\" (2026-03-20 07:37:51 +0000 UTC to 2027-03-20 07:37:51 +0000 UTC (now=2026-03-20 08:38:50.945135242 +0000 UTC))" 2026-03-20T08:38:50.945312417Z I0320 08:38:50.945264 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773995872\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773995871\" (2026-03-20 07:37:51 +0000 UTC to 2029-03-20 07:37:51 +0000 UTC (now=2026-03-20 08:38:50.945256926 +0000 UTC))" 2026-03-20T08:39:06.212303221Z I0320 08:39:06.212216 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-03-20T08:39:06.221098998Z I0320 08:39:06.221021 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-56f686584b-fdcx5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:39:06.229143892Z I0320 08:39:06.221115 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-fc56bb77c-qd4sn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:39:09.193659435Z I0320 08:39:09.193571 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-cc955" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:39:09.396719051Z I0320 08:39:09.395217 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-dtqgc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:39:09.925409350Z I0320 08:39:09.923742 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-6c8df6d4b-5m857" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:39:10.342045408Z I0320 08:39:10.341827 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856-7vxxr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:39:10.421385864Z I0320 08:39:10.421115 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-5c6485487f-qb94j" node="master-0" evaluatedNodes=1 feasibleNodes=1 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006276415157203665030440 0ustar00000000000000002026-03-20T08:34:25.992843335Z I0320 08:34:25.992693 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-machine-config-operator/machine-config-operator-84d549f6d5-gm4qr" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-20T08:34:56.554227940Z I0320 08:34:56.554098 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/mtu-prober-fwvpv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:35:06.423217748Z I0320 08:35:06.421900 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-2fp4b" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:35:06.606967588Z I0320 08:35:06.606876 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-additional-cni-plugins-rpbcn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:35:07.398167821Z I0320 08:35:07.398069 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/network-metrics-daemon-srdjm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:35:09.388054899Z I0320 08:35:09.387940 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-multus/multus-admission-controller-5dbbb8b86f-5rrrh" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-20T08:35:18.810049029Z I0320 08:35:18.809943 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-57f769d897-z2zpj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:35:19.017236411Z I0320 08:35:19.016473 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-nsmzc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:35:20.998427011Z I0320 08:35:20.997542 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-b4bf74f6-fhvg6" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-20T08:35:21.998173698Z I0320 08:35:21.997782 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-xnrw6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:35:24.618082002Z I0320 08:35:24.616325 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-6t5vb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:35:52.202687240Z I0320 08:35:52.202596 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-rxdwp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.911169120Z I0320 08:36:06.911036 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5f5d689c6b-4dqrh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.945080080Z I0320 08:36:06.944948 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-67dcd4998-c5742" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.946151 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-th2vj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.946252 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-5c9796789-tjm9l" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.946489 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-6f69995874-dv6cd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.946930 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-5dbbb8b86f-5rrrh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.946973 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-5885bfd7f4-62zrx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.947011 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-b865698dc-qzb2h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.947139 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-fzm28" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.947270 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-9c5679d8f-r6dm8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.947301 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-84d549f6d5-gm4qr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.947467 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-c6vkz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.947504 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-25cml" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.947736 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-vx5d7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.947772 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-8544cbcf9c-brhw4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.947798 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-58845fbb57-nljsr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.947823 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-p7pt6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.948326 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-89ccd998f-mvn4t" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.948418 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-2pg77" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.948480 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-5549dc66cb-fmhbq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.948539 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-7d87854d6-vlq7h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.948669 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-qcpb4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.948741 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-6bb5bfb6fd-64dg5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.948791 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-66b84d69b-gzg9m" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.950680404Z I0320 08:36:06.949619 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-598fbc5f8f-vxzvg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:06.990272169Z I0320 08:36:06.990119 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-dd9wv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:20.083777912Z I0320 08:36:20.083694 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-8487694857-w5tlr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:20.431311735Z I0320 08:36:20.430817 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-64854d9cff-f44gr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:21.581551242Z I0320 08:36:21.581383 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-797c5b47d8-xrgq6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:21.983295356Z I0320 08:36:21.982280 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-6cd6978d68-4chhh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:22.471146873Z I0320 08:36:22.468521 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-79bc6b8d76-72j8t" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:23.587944733Z I0320 08:36:23.584551 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-f9d74d9cf-ks2l5" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-20T08:36:23.604310071Z I0320 08:36:23.601602 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-5ff6bdb8cf-b6499" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-20T08:36:24.824231182Z I0320 08:36:24.822175 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-5ff6bdb8cf-b6499" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-20T08:36:24.832096112Z I0320 08:36:24.831481 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-f9d74d9cf-ks2l5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:26.894113978Z I0320 08:36:26.894031 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-5ff6bdb8cf-b6499" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:36.683270502Z I0320 08:36:36.681591 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-c765cd67b-xddmb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:40.723225999Z I0320 08:36:40.723086 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-779f85678d-lrzfz" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-20T08:36:41.045464393Z I0320 08:36:41.045277 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5dcd9ffc84-qh6pq" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-20T08:36:41.136945412Z I0320 08:36:41.136879 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-74cf48bcc6-kwngm" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-20T08:36:41.554109405Z I0320 08:36:41.551577 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-57777556ff-nk2rf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:41.722077327Z I0320 08:36:41.721994 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-6864dc98f7-74mgr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:41.829126431Z I0320 08:36:41.828741 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-hb77b" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:42.459851058Z I0320 08:36:42.459763 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-v5h69" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:42.754761074Z I0320 08:36:42.754359 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-779f85678d-lrzfz" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-20T08:36:42.756583307Z I0320 08:36:42.755494 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-74cf48bcc6-kwngm" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-20T08:36:42.765217079Z I0320 08:36:42.765127 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-5dcd9ffc84-qh6pq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:42.926358622Z I0320 08:36:42.925924 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-7dcf5569b5-xmvwz" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-20T08:36:42.961808606Z I0320 08:36:42.961728 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-qnp9w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:44.791239454Z I0320 08:36:44.791109 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-6fccff6869-f98nk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:45.364648877Z I0320 08:36:45.364439 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-779f85678d-lrzfz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:45.367438569Z I0320 08:36:45.367382 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-74cf48bcc6-kwngm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:50.275286403Z I0320 08:36:50.272972 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-oauth-apiserver/apiserver-bc9b556d6-vdnq2" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-20T08:36:53.210569523Z I0320 08:36:53.210405 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-bc9b556d6-vdnq2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:36:54.366953180Z I0320 08:36:54.366814 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-daemon-9t8x6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:00.638979824Z I0320 08:37:00.638545 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-6486d766f9-5b77h" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-20T08:37:00.958435327Z I0320 08:37:00.957586 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-7ffc895647-6j97v" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-20T08:37:02.621437658Z I0320 08:37:02.621228 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-6486d766f9-5b77h" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-20T08:37:02.621611343Z I0320 08:37:02.621575 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-7ffc895647-6j97v" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-20T08:37:02.946254006Z I0320 08:37:02.945328 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-7d58488df-qmm8h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:03.835167937Z I0320 08:37:03.834733 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594-tkc2j" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-20T08:37:04.701480589Z I0320 08:37:04.698574 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-srjqw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:05.298230114Z I0320 08:37:05.295039 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-mgcb9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:05.410438848Z I0320 08:37:05.408960 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-7ffc895647-6j97v" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:05.410438848Z I0320 08:37:05.409269 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6486d766f9-5b77h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:05.624341771Z I0320 08:37:05.622987 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-controller-b4f87c5b9-pj7rj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:07.063146298Z I0320 08:37:07.062731 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-86g9n" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:07.442336584Z I0320 08:37:07.437036 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-6c85f64bb9-fmpsg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:07.630905107Z I0320 08:37:07.630230 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress/router-default-7dcf5569b5-xmvwz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:07.641686622Z I0320 08:37:07.639750 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594-tkc2j" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:07.650850949Z I0320 08:37:07.650454 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-source-b4bf74f6-fhvg6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:07.723663894Z I0320 08:37:07.721656 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-zspn5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:14.601957771Z I0320 08:37:14.601829 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-server-gj4pm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:20.546802219Z I0320 08:37:20.546683 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-6f97756bc8-7t5qv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:20.886976765Z I0320 08:37:20.886838 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-fc56bb77c-qd4sn" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-20T08:37:20.911671566Z I0320 08:37:20.911429 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-56f686584b-fdcx5" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-20T08:37:22.419289342Z I0320 08:37:22.419178 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-6cb57bb5db-mt758" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:25.841247154Z I0320 08:37:25.837661 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77-r4qvh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:25.936554426Z I0320 08:37:25.936225 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78-mwfgx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:27.614271026Z I0320 08:37:27.612665 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-866dc4744-xwxg7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:28.067506932Z I0320 08:37:28.066926 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-68bf6ff9d6-mvfn5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:29.918675694Z I0320 08:37:29.917559 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c-xhq29" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:30.076964904Z I0320 08:37:30.071821 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-6fbb6cf6f9-n8tnn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-20T08:37:40.822250819Z E0320 08:37:40.822094 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path 2026-03-20T08:37:45.824575519Z E0320 08:37:45.824453 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io kube-scheduler) 2026-03-20T08:37:45.857477659Z I0320 08:37:45.857380 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2026-03-20T08:37:50.860317136Z E0320 08:37:50.859524 1 leaderelection.go:322] Failed to release lock: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-20T08:37:50.860317136Z E0320 08:37:50.859619 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515157203665023016 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"9c56eead-effb-4886-902a-d6118236b54b","resourceVersion":"9045","creationTimestamp":"2026-03-20T08:35:21Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"c83737980b9ee109184b1d78e942cf36","kubernetes.io/config.mirror":"c83737980b9ee109184b1d78e942cf36","kubernetes.io/config.seen":"2026-03-20T08:33:49.482968720Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"7bc50120-3879-4454-8162-ec2f348aada5","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:14Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:14Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:37:51Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:37:51Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:14Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-20T08:36:14Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-03-20T08:37:51Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-03-20T08:33:58Z","finishedAt":"2026-03-20T08:37:50Z","containerID":"cri-o://6369057ac22c507cf87d187a9b3dae20c7b88e730a831d4ea4937e43b3fed7fb"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","containerID":"cri-o://865ba621afdb76437d315fccb4bc81df59adddaddae54ec22d99130fa629dce8","started":true}],"qosClass":"Burstable"}}cluster-policy-controller_current.log0000640000000000000000000010245515157203665034231 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-20T08:34:07.820713046Z I0320 08:34:07.820630 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:34:08.002139231Z I0320 08:34:08.002016 1 request.go:700] Waited for 5.39405007s due to client-side throttling, not priority and fairness, request: GET:https://localhost:6443/apis/operators.coreos.com/v1alpha1/clusterserviceversions?limit=500&resourceVersion=0 2026-03-20T08:34:08.052265421Z I0320 08:34:08.051522 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:34:08.217827788Z I0320 08:34:08.217749 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:34:08.442963649Z I0320 08:34:08.442853 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:34:08.614899849Z I0320 08:34:08.614762 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:34:08.816562413Z I0320 08:34:08.816232 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:34:09.026630971Z I0320 08:34:09.026489 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:34:09.201365944Z I0320 08:34:09.201138 1 request.go:700] Waited for 6.592771697s due to client-side throttling, not priority and fairness, request: GET:https://localhost:6443/apis/monitoring.coreos.com/v1/alertmanagers?limit=500&resourceVersion=0 2026-03-20T08:34:09.245248956Z I0320 08:34:09.245103 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:34:09.267082243Z I0320 08:34:09.266977 1 reconciliation_controller.go:149] Caches are synced 2026-03-20T08:34:09.309711218Z I0320 08:34:09.309562 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-20T08:34:11.778423460Z W0320 08:34:11.778272 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-20T08:34:11.778423460Z E0320 08:34:11.778344 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-20T08:34:20.169460576Z W0320 08:34:20.169354 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-20T08:34:20.169460576Z E0320 08:34:20.169407 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-20T08:34:38.352154047Z W0320 08:34:38.352034 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-20T08:34:38.352154047Z E0320 08:34:38.352097 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-20T08:35:01.180450585Z E0320 08:35:01.180302 1 leaderelection.go:429] Failed to update lock optimitically: Operation cannot be fulfilled on leases.coordination.k8s.io "cluster-policy-controller-lock": StorageError: invalid object, Code: 4, Key: /kubernetes.io/leases/kube-system/cluster-policy-controller-lock, ResourceVersion: 0, AdditionalErrorMsg: Precondition failed: UID in precondition: 166f8999-85a6-4663-a491-56e189f6f409, UID in object meta: , falling back to slow path 2026-03-20T08:35:03.670647107Z I0320 08:35:03.670465 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-multus namespace 2026-03-20T08:35:04.574747318Z I0320 08:35:04.574638 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-03-20T08:35:04.774494329Z I0320 08:35:04.774388 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-03-20T08:35:09.326725630Z I0320 08:35:09.326653 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [k8s.cni.cncf.io/v1, Resource=network-attachment-definitions whereabouts.cni.cncf.io/v1alpha1, Resource=ippools whereabouts.cni.cncf.io/v1alpha1, Resource=nodeslicepools whereabouts.cni.cncf.io/v1alpha1, Resource=overlappingrangeipreservations], removed: [] 2026-03-20T08:35:09.326818632Z I0320 08:35:09.326785 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="nodeslicepools.whereabouts.cni.cncf.io" 2026-03-20T08:35:09.326992828Z I0320 08:35:09.326840 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ippools.whereabouts.cni.cncf.io" 2026-03-20T08:35:09.326992828Z I0320 08:35:09.326867 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="network-attachment-definitions.k8s.cni.cncf.io" 2026-03-20T08:35:09.326992828Z I0320 08:35:09.326913 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="overlappingrangeipreservations.whereabouts.cni.cncf.io" 2026-03-20T08:35:09.342320960Z I0320 08:35:09.342245 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:35:09.350332587Z I0320 08:35:09.350286 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:35:09.355429774Z I0320 08:35:09.355399 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:35:09.365166374Z I0320 08:35:09.365111 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:35:09.428013980Z I0320 08:35:09.427951 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-20T08:35:10.384995229Z I0320 08:35:10.384885 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ovn-kubernetes namespace 2026-03-20T08:35:13.685065675Z W0320 08:35:13.683729 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-20T08:35:13.685065675Z E0320 08:35:13.683783 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-20T08:35:18.383835270Z I0320 08:35:18.383749 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-host-network namespace 2026-03-20T08:35:19.587233439Z I0320 08:35:19.587109 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-diagnostics namespace 2026-03-20T08:35:22.782390814Z I0320 08:35:22.782258 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-node-identity namespace 2026-03-20T08:35:23.169660544Z I0320 08:35:23.169600 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "network-node-identity" not found 2026-03-20T08:35:23.575493306Z I0320 08:35:23.574758 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "network-node-identity-leases" not found 2026-03-20T08:35:39.434169645Z I0320 08:35:39.434080 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [k8s.cni.cncf.io/v1alpha1, Resource=ipamclaims k8s.ovn.org/v1, Resource=egressfirewalls k8s.ovn.org/v1, Resource=egressqoses k8s.ovn.org/v1, Resource=egressservices k8s.ovn.org/v1, Resource=userdefinednetworks], removed: [] 2026-03-20T08:35:39.434257998Z I0320 08:35:39.434242 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="userdefinednetworks.k8s.ovn.org" 2026-03-20T08:35:39.434323340Z I0320 08:35:39.434275 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressservices.k8s.ovn.org" 2026-03-20T08:35:39.434323340Z I0320 08:35:39.434303 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ipamclaims.k8s.cni.cncf.io" 2026-03-20T08:35:39.434336690Z I0320 08:35:39.434324 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressfirewalls.k8s.ovn.org" 2026-03-20T08:35:39.434378352Z I0320 08:35:39.434353 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressqoses.k8s.ovn.org" 2026-03-20T08:35:39.436211808Z I0320 08:35:39.436138 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:35:39.436211808Z I0320 08:35:39.436169 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:35:39.436259650Z I0320 08:35:39.436224 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:35:39.436571059Z I0320 08:35:39.436522 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:35:39.436585880Z I0320 08:35:39.436532 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:35:39.535586699Z I0320 08:35:39.535479 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-20T08:36:01.439723444Z W0320 08:36:01.439612 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-20T08:36:01.439723444Z E0320 08:36:01.439680 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-20T08:36:20.024359158Z I0320 08:36:20.024297 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-kube-storage-version-migrator namespace 2026-03-20T08:36:20.790711333Z I0320 08:36:20.786845 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-controller-manager namespace 2026-03-20T08:36:20.826692213Z I0320 08:36:20.826491 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-service-ca namespace 2026-03-20T08:36:20.940524255Z I0320 08:36:20.940037 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-route-controller-manager namespace 2026-03-20T08:36:26.081805282Z I0320 08:36:26.081418 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-apiserver namespace 2026-03-20T08:36:27.350038852Z I0320 08:36:27.349788 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-oauth-apiserver namespace 2026-03-20T08:36:29.055349688Z I0320 08:36:29.055270 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:36:30.949729121Z I0320 08:36:30.949617 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-authentication namespace 2026-03-20T08:36:31.528935874Z I0320 08:36:31.528609 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-operator-controller namespace 2026-03-20T08:36:31.563943735Z I0320 08:36:31.559101 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-catalogd namespace 2026-03-20T08:36:37.542694932Z I0320 08:36:37.542616 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:openshift:useroauthaccesstoken-manager" not found 2026-03-20T08:36:39.909036868Z I0320 08:36:39.908445 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [snapshot.storage.k8s.io/v1, Resource=volumesnapshots], removed: [] 2026-03-20T08:36:39.909201813Z I0320 08:36:39.909147 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="volumesnapshots.snapshot.storage.k8s.io" 2026-03-20T08:36:39.910921293Z I0320 08:36:39.910895 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-20T08:36:40.009853731Z I0320 08:36:40.009773 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-20T08:36:42.237331374Z I0320 08:36:42.237264 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-dns namespace 2026-03-20T08:36:42.770899115Z I0320 08:36:42.770782 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ingress namespace 2026-03-20T08:36:52.314708599Z I0320 08:36:52.314629 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-03-20T08:36:55.912626106Z I0320 08:36:55.912090 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift namespace 2026-03-20T08:36:55.948888694Z I0320 08:36:55.948730 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-node namespace 2026-03-20T08:36:56.891488372Z I0320 08:36:56.891235 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-03-20T08:37:00.211864710Z W0320 08:37:00.211776 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-20T08:37:00.211864710Z E0320 08:37:00.211850 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-20T08:37:03.263856775Z I0320 08:37:03.263743 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-5vbxd" has been approved 2026-03-20T08:37:03.311754022Z I0320 08:37:03.311558 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-mk9bw" has been approved 2026-03-20T08:37:10.019707939Z I0320 08:37:10.019583 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1 2026-03-20T08:37:10.019707939Z E0320 08:37:10.019676 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1" 2026-03-20T08:37:21.169341975Z I0320 08:37:21.169257 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "openshift-marketplace-metrics" not found 2026-03-20T08:37:25.579089224Z I0320 08:37:25.579017 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-cluster-autoscaler-operator" not found 2026-03-20T08:37:25.862412182Z I0320 08:37:25.857212 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-03-20T08:37:26.212416746Z I0320 08:37:26.212352 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s" not found 2026-03-20T08:37:26.707817233Z I0320 08:37:26.707735 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-03-20T08:37:28.852026647Z I0320 08:37:28.851920 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-machine-api-operator" not found 2026-03-20T08:37:40.030888695Z I0320 08:37:40.030772 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-20T08:37:40.030888695Z E0320 08:37:40.030865 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-20T08:37:53.990841533Z W0320 08:37:53.990764 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-20T08:37:53.990841533Z E0320 08:37:53.990830 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-20T08:38:10.043698400Z I0320 08:38:10.043519 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-20T08:38:10.043698400Z E0320 08:38:10.043680 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-20T08:38:35.405802285Z E0320 08:38:35.405740 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-20T08:38:40.052965591Z I0320 08:38:40.052797 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-20T08:38:40.052965591Z E0320 08:38:40.052909 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-20T08:38:49.724377089Z W0320 08:38:49.724290 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-20T08:38:49.724511623Z E0320 08:38:49.724491 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-20T08:39:10.071255106Z I0320 08:39:10.066292 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-20T08:39:10.071255106Z E0320 08:39:10.066408 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" kube-controller-manager_current.log0000640000000000000000000012073715157203665033614 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-20T08:39:10.407670853Z I0320 08:39:10.407571 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-image-registry-ibmcos, uid: 486f8750-13da-4a31-bf62-3b5f9642d39e]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.407670853Z I0320 08:39:10.407613 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: aws-ebs-csi-driver-operator, uid: dadfab89-dd3a-45d1-9f30-bb1d2feeac8f]" virtual=false 2026-03-20T08:39:10.407757546Z I0320 08:39:10.407695 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-machine-api-gcp, uid: 7ee56da2-fd14-4aa4-b0f0-aada216c4fe2]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.407757546Z I0320 08:39:10.407710 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-cloud-network-config-controller-azure, uid: 3c6c11bc-43b0-4df9-9e15-565fd25e5142]" virtual=false 2026-03-20T08:39:10.407850239Z I0320 08:39:10.407803 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/PrometheusRule, namespace: openshift-kube-controller-manager-operator, name: kube-controller-manager-operator, uid: 39770890-acdd-4cad-aa53-bea185630ca7]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.407850239Z I0320 08:39:10.407831 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-network, uid: 7fcc3896-c3c2-4f5c-aca0-d18d63d3a33b]" virtual=false 2026-03-20T08:39:10.411345271Z I0320 08:39:10.411059 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-machine-api-nutanix, uid: 199d00d5-e217-49f1-adc1-6bfa61fd12e2]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.411345271Z I0320 08:39:10.411127 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-cloud-network-config-controller-gcp, uid: 0ec3a051-4637-490c-abdf-8146719cc224]" virtual=false 2026-03-20T08:39:10.411345271Z I0320 08:39:10.411231 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/PrometheusRule, namespace: openshift-kube-scheduler-operator, name: kube-scheduler-operator, uid: 2b7f8606-3866-445d-99a6-3f2b3765200c]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.411345271Z I0320 08:39:10.411302 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-gcp-pd-csi-driver-operator, uid: 4cb10c93-dd55-404e-b163-92faf1ed8095]" virtual=false 2026-03-20T08:39:10.415455901Z I0320 08:39:10.415257 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/PrometheusRule, namespace: openshift-machine-config-operator, name: machine-config-daemon, uid: b0c4efc4-4bb0-433f-ba80-67a3769c8116]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.415455901Z I0320 08:39:10.415298 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-machine-api-vsphere, uid: 88a69fc4-21dd-4da3-899d-57d612aefdf4]" virtual=false 2026-03-20T08:39:10.415455901Z I0320 08:39:10.415354 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/PrometheusRule, namespace: openshift-marketplace, name: marketplace-alert-rules, uid: 4045fd35-5515-419f-adf1-e9b5aca02586]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.415455901Z I0320 08:39:10.415428 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-cloud-network-config-controller-aws, uid: 8e1adf2f-63a7-44d4-986d-ebe5acf59dc5]" virtual=false 2026-03-20T08:39:10.423636099Z I0320 08:39:10.423522 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-machine-api-openstack, uid: bb2b8da8-146f-4b3c-a93b-d5c86e9f2946]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.423636099Z I0320 08:39:10.423569 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-image-registry-gcs, uid: ce027f0e-4009-4614-9436-831f9321966a]" virtual=false 2026-03-20T08:39:10.423821685Z I0320 08:39:10.423791 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="54.13432ms" 2026-03-20T08:39:10.424019910Z I0320 08:39:10.423958 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/PrometheusRule, namespace: openshift-network-operator, name: openshift-network-operator-ipsec-rules, uid: 154c73dc-a3a9-47f1-a8e5-90c327a5aa9b]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"f3437cbd-3241-4219-9ef3-5788faecde6f","controller":true,"blockOwnerDeletion":true}] 2026-03-20T08:39:10.424019910Z I0320 08:39:10.423999 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-multus, name: monitor-multus-admission-controller, uid: 0e996034-681e-4940-ae0f-c85c64684db5]" virtual=false 2026-03-20T08:39:10.425001609Z I0320 08:39:10.424952 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-image-registry-ibmcos-powervs, uid: d53db94d-94ad-47a9-8acb-bbbf065605e4]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.425025220Z I0320 08:39:10.424990 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-operator-lifecycle-manager, name: olm-operator, uid: 04dbb9f8-567a-4cc8-befb-e3802f7559fc]" virtual=false 2026-03-20T08:39:10.433364363Z I0320 08:39:10.431370 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-machine-api-aws, uid: c5808b51-cc29-4f11-b42c-8ff713d3ff29]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.433364363Z I0320 08:39:10.431414 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-ovn-kubernetes, name: monitor-ovn-control-plane-metrics, uid: 1e5c6f67-7a2e-4f10-acb3-3499922679bc]" virtual=false 2026-03-20T08:39:10.439350228Z I0320 08:39:10.439272 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="15.4445ms" 2026-03-20T08:39:10.439594985Z I0320 08:39:10.439553 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="66.802µs" 2026-03-20T08:39:10.454155980Z I0320 08:39:10.453069 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: manila-csi-driver-operator, uid: d4002ab6-0eb5-4960-a89b-d4bac2ef03e6]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.454155980Z I0320 08:39:10.453144 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-authentication, name: oauth-openshift, uid: 76585a81-8225-4f4b-bb80-b9b1755f8c88]" virtual=false 2026-03-20T08:39:10.454155980Z I0320 08:39:10.453244 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: ibm-vpc-block-csi-driver-operator, uid: 2ccf9bc0-6ba9-41bd-bcf9-718cedee9af4]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.454155980Z I0320 08:39:10.453264 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-controller-manager-operator, name: openshift-controller-manager-operator, uid: fdc40ef6-7992-471b-a2ed-0cf938030bfc]" virtual=false 2026-03-20T08:39:10.454155980Z I0320 08:39:10.453318 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-ingress-azure, uid: 1b37c121-645e-4fe9-b1f3-9b76760b4749]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.454155980Z I0320 08:39:10.453333 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[network.operator.openshift.io/v1/OperatorPKI, namespace: openshift-network-node-identity, name: network-node-identity, uid: cf207a12-d661-4728-af7f-d19b93f41e60]" virtual=false 2026-03-20T08:39:10.454155980Z I0320 08:39:10.453559 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-cloud-network-config-controller-openstack, uid: bc0403be-3f6e-48ea-96a0-b6c07ac8fcdd]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.454155980Z I0320 08:39:10.453581 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[network.operator.openshift.io/v1/OperatorPKI, namespace: openshift-ovn-kubernetes, name: ovn, uid: b936a8aa-924e-495a-a5b8-89865a275a1d]" virtual=false 2026-03-20T08:39:10.454155980Z I0320 08:39:10.454004 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-image-registry-azure, uid: 70c3ab61-31ee-4d23-8f38-b48762a34bad]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.454155980Z I0320 08:39:10.454085 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[network.operator.openshift.io/v1/OperatorPKI, namespace: openshift-ovn-kubernetes, name: signer, uid: 789dc26f-98b8-4a31-af53-6da4afed09cf]" virtual=false 2026-03-20T08:39:10.474752731Z I0320 08:39:10.474672 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="61.302µs" 2026-03-20T08:39:10.498089822Z I0320 08:39:10.497370 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-ingress-gcp, uid: ec44cb7a-55aa-4317-8b3f-51cce729bef6]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.498089822Z I0320 08:39:10.497481 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-kube-controller-manager, name: kube-controller-manager, uid: 64877b51-6123-4a7a-b5d8-c18890435abf]" virtual=false 2026-03-20T08:39:10.515112979Z I0320 08:39:10.515006 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-vmware-vsphere-csi-driver-operator, uid: 613fa7cd-4c70-4f04-9350-1efea65520ac]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.515112979Z I0320 08:39:10.515074 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-marketplace, name: marketplace-operator, uid: 65ecc522-f24c-4213-855d-ba0bbcd11327]" virtual=false 2026-03-20T08:39:10.519973721Z I0320 08:39:10.519901 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: ovirt-csi-driver-operator, uid: 05d7c8e2-aea4-4cb0-a854-3d8c2055d6b9]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.519997301Z I0320 08:39:10.519962 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-route-controller-manager, name: openshift-route-controller-manager, uid: 8ba37613-7050-4748-b3aa-7c5ffbc4fb8d]" virtual=false 2026-03-20T08:39:10.523692889Z I0320 08:39:10.523602 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-cloud-network-config-controller-azure, uid: 3c6c11bc-43b0-4df9-9e15-565fd25e5142]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.523713150Z I0320 08:39:10.523689 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-image-registry, name: image-registry-operator, uid: fe3bd866-45f1-4f7d-8242-2f511d954c7f]" virtual=false 2026-03-20T08:39:10.526643655Z I0320 08:39:10.526597 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: aws-ebs-csi-driver-operator, uid: dadfab89-dd3a-45d1-9f30-bb1d2feeac8f]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.526662846Z I0320 08:39:10.526632 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-kube-scheduler-operator, name: kube-scheduler-operator, uid: 2725f234-928d-431e-a9aa-096bc43f9f43]" virtual=false 2026-03-20T08:39:10.528635333Z I0320 08:39:10.528570 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-network, uid: 7fcc3896-c3c2-4f5c-aca0-d18d63d3a33b]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.528656854Z I0320 08:39:10.528640 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-apiserver-operator, name: openshift-apiserver-operator, uid: 7926ac81-5e90-4b84-8533-6d4b6aa71c70]" virtual=false 2026-03-20T08:39:10.531218539Z I0320 08:39:10.530656 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-cloud-network-config-controller-gcp, uid: 0ec3a051-4637-490c-abdf-8146719cc224]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.531218539Z I0320 08:39:10.530729 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-apiserver, name: openshift-apiserver, uid: 7860d82f-e8f9-4644-bea0-790f8ce73e3c]" virtual=false 2026-03-20T08:39:10.536316728Z I0320 08:39:10.535015 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-gcp-pd-csi-driver-operator, uid: 4cb10c93-dd55-404e-b163-92faf1ed8095]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.536316728Z I0320 08:39:10.535065 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-apiserver, name: openshift-apiserver-operator-check-endpoints, uid: 7389e299-c53c-4803-9238-452ba9ef293b]" virtual=false 2026-03-20T08:39:10.537895924Z I0320 08:39:10.537827 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-machine-api-vsphere, uid: 88a69fc4-21dd-4da3-899d-57d612aefdf4]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.537914944Z I0320 08:39:10.537881 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-cluster-samples-operator, name: cluster-samples-operator, uid: 178dc28c-f994-4126-89ac-588fffa6d424]" virtual=false 2026-03-20T08:39:10.544035773Z I0320 08:39:10.543833 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-cloud-network-config-controller-aws, uid: 8e1adf2f-63a7-44d4-986d-ebe5acf59dc5]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.544035773Z I0320 08:39:10.543893 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apps/v1/DaemonSet, namespace: openshift-dns, name: dns-default, uid: d795b353-9f46-4149-b744-1ba4c648f247]" virtual=false 2026-03-20T08:39:10.551436589Z I0320 08:39:10.550571 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[cloudcredential.openshift.io/v1/CredentialsRequest, namespace: openshift-cloud-credential-operator, name: openshift-image-registry-gcs, uid: ce027f0e-4009-4614-9436-831f9321966a]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.551436589Z I0320 08:39:10.550670 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-multus, name: monitor-network, uid: 9497a851-aab5-404a-bd76-87bdb8d7ba8e]" virtual=false 2026-03-20T08:39:10.551436589Z I0320 08:39:10.550900 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-multus, name: monitor-multus-admission-controller, uid: 0e996034-681e-4940-ae0f-c85c64684db5]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"f3437cbd-3241-4219-9ef3-5788faecde6f","controller":true,"blockOwnerDeletion":true}] 2026-03-20T08:39:10.551436589Z I0320 08:39:10.550929 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-ovn-kubernetes, name: monitor-ovn-node, uid: fd34ee7e-d9ac-4f68-acc8-b4d0a80bea68]" virtual=false 2026-03-20T08:39:10.555633311Z I0320 08:39:10.555529 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-ovn-kubernetes, name: monitor-ovn-control-plane-metrics, uid: 1e5c6f67-7a2e-4f10-acb3-3499922679bc]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"f3437cbd-3241-4219-9ef3-5788faecde6f","controller":true,"blockOwnerDeletion":true}] 2026-03-20T08:39:10.555656452Z I0320 08:39:10.555613 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-service-ca-operator, name: service-ca-operator, uid: bf295607-109a-40e3-96e2-a4ae25967860]" virtual=false 2026-03-20T08:39:10.557281469Z I0320 08:39:10.557170 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-operator-lifecycle-manager, name: olm-operator, uid: 04dbb9f8-567a-4cc8-befb-e3802f7559fc]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.557328281Z I0320 08:39:10.557297 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-operator-lifecycle-manager, name: package-server-manager-metrics, uid: 5d396ee2-5062-4b9f-8a2d-9a3ce10a4a0f]" virtual=false 2026-03-20T08:39:10.563675776Z I0320 08:39:10.563605 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-authentication, name: oauth-openshift, uid: 76585a81-8225-4f4b-bb80-b9b1755f8c88]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.563675776Z I0320 08:39:10.563651 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-authentication-operator, name: authentication-operator, uid: 7e5453e1-31a5-46ac-a081-0298fe8beeb3]" virtual=false 2026-03-20T08:39:10.566995763Z I0320 08:39:10.566806 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-controller-manager-operator, name: openshift-controller-manager-operator, uid: fdc40ef6-7992-471b-a2ed-0cf938030bfc]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.566995763Z I0320 08:39:10.566845 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-cluster-node-tuning-operator, name: node-tuning-operator, uid: de3f4719-c8ff-4a38-8bba-e3a4c0e10320]" virtual=false 2026-03-20T08:39:10.570466884Z I0320 08:39:10.570409 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[network.operator.openshift.io/v1/OperatorPKI, namespace: openshift-network-node-identity, name: network-node-identity, uid: cf207a12-d661-4728-af7f-d19b93f41e60]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"f3437cbd-3241-4219-9ef3-5788faecde6f","controller":true,"blockOwnerDeletion":true}] 2026-03-20T08:39:10.570466884Z I0320 08:39:10.570449 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-cluster-version, name: cluster-version-operator, uid: 44ccfbdb-85d5-413b-bf81-316e069c2175]" virtual=false 2026-03-20T08:39:10.573254986Z I0320 08:39:10.573112 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[network.operator.openshift.io/v1/OperatorPKI, namespace: openshift-ovn-kubernetes, name: ovn, uid: b936a8aa-924e-495a-a5b8-89865a275a1d]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"f3437cbd-3241-4219-9ef3-5788faecde6f","controller":true,"blockOwnerDeletion":true}] 2026-03-20T08:39:10.573254986Z I0320 08:39:10.573141 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-kube-apiserver-operator, name: kube-apiserver-operator, uid: 43aabe1a-ff77-4a72-a204-c4a2a9100775]" virtual=false 2026-03-20T08:39:10.576627604Z I0320 08:39:10.576478 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[network.operator.openshift.io/v1/OperatorPKI, namespace: openshift-ovn-kubernetes, name: signer, uid: 789dc26f-98b8-4a31-af53-6da4afed09cf]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"f3437cbd-3241-4219-9ef3-5788faecde6f","controller":true,"blockOwnerDeletion":true}] 2026-03-20T08:39:10.576627604Z I0320 08:39:10.576576 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-machine-api, name: machine-api-operator, uid: 02baad89-2781-427b-a520-0496cda43c81]" virtual=false 2026-03-20T08:39:10.623493752Z I0320 08:39:10.623384 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-kube-controller-manager, name: kube-controller-manager, uid: 64877b51-6123-4a7a-b5d8-c18890435abf]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.623493752Z I0320 08:39:10.623463 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-cloud-credential-operator, name: cloud-credential-operator, uid: b80e2c3f-e52c-4667-a3aa-1ea5a77dde2a]" virtual=false 2026-03-20T08:39:10.642048643Z I0320 08:39:10.641942 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-marketplace, name: marketplace-operator, uid: 65ecc522-f24c-4213-855d-ba0bbcd11327]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.642048643Z I0320 08:39:10.642025 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-controller-manager, name: openshift-controller-manager, uid: 5854bf77-51ec-45ab-acb4-d941330840e6]" virtual=false 2026-03-20T08:39:10.651220281Z I0320 08:39:10.651114 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-route-controller-manager, name: openshift-route-controller-manager, uid: 8ba37613-7050-4748-b3aa-7c5ffbc4fb8d]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.651253522Z I0320 08:39:10.651202 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-image-registry, name: image-registry, uid: 8afe64a7-505d-4df4-9941-761801b0555b]" virtual=false 2026-03-20T08:39:10.651281983Z I0320 08:39:10.651236 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-image-registry, name: image-registry-operator, uid: fe3bd866-45f1-4f7d-8242-2f511d954c7f]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.651314354Z I0320 08:39:10.651283 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-kube-apiserver, name: kube-apiserver, uid: 9f46fbd5-9089-4a17-aa26-b4fb4ee9904d]" virtual=false 2026-03-20T08:39:10.654679592Z I0320 08:39:10.654488 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-kube-scheduler-operator, name: kube-scheduler-operator, uid: 2725f234-928d-431e-a9aa-096bc43f9f43]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.654679592Z I0320 08:39:10.654519 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-kube-controller-manager-operator, name: kube-controller-manager-operator, uid: 00273e46-18fd-439b-8843-ac1b5e2983a4]" virtual=false 2026-03-20T08:39:10.655638670Z I0320 08:39:10.655601 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-apiserver-operator, name: openshift-apiserver-operator, uid: 7926ac81-5e90-4b84-8533-6d4b6aa71c70]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.655656600Z I0320 08:39:10.655635 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-machine-config-operator, name: machine-config-operator, uid: e8e71515-6472-4b84-86aa-3cc87d8df367]" virtual=false 2026-03-20T08:39:10.657776222Z I0320 08:39:10.657738 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-apiserver, name: openshift-apiserver, uid: 7860d82f-e8f9-4644-bea0-790f8ce73e3c]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.657808413Z I0320 08:39:10.657770 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-cluster-machine-approver, name: cluster-machine-approver, uid: 969d91b7-c1b8-4b51-a131-623ea838789a]" virtual=false 2026-03-20T08:39:10.662618643Z I0320 08:39:10.662561 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-apiserver, name: openshift-apiserver-operator-check-endpoints, uid: 7389e299-c53c-4803-9238-452ba9ef293b]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.662618643Z I0320 08:39:10.662591 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-config-operator, name: config-operator, uid: 6649270f-2f31-487d-956a-e0a111b5e3e5]" virtual=false 2026-03-20T08:39:10.665086425Z I0320 08:39:10.665036 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-cluster-samples-operator, name: cluster-samples-operator, uid: 178dc28c-f994-4126-89ac-588fffa6d424]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.665086425Z I0320 08:39:10.665067 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-ingress-operator, name: ingress-operator, uid: aca44134-1337-4831-a5b8-f06fe98c35e2]" virtual=false 2026-03-20T08:39:10.667154366Z I0320 08:39:10.667101 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apps/v1/DaemonSet, namespace: openshift-dns, name: dns-default, uid: d795b353-9f46-4149-b744-1ba4c648f247]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"DNS","name":"default","uid":"92360cee-1fcc-45be-b46e-3b0428563628","controller":true}] 2026-03-20T08:39:10.667154366Z I0320 08:39:10.667128 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-machine-config-operator, name: machine-config-controller, uid: e0568130-4b57-42a5-8b0d-d56d3d8c503f]" virtual=false 2026-03-20T08:39:10.671775381Z I0320 08:39:10.671713 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-multus, name: monitor-network, uid: 9497a851-aab5-404a-bd76-87bdb8d7ba8e]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"f3437cbd-3241-4219-9ef3-5788faecde6f","controller":true,"blockOwnerDeletion":true}] 2026-03-20T08:39:10.671775381Z I0320 08:39:10.671750 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-machine-config-operator, name: machine-config-daemon, uid: d96be5a1-4c6a-4ca8-9316-281ba0bdfc47]" virtual=false 2026-03-20T08:39:10.674237243Z I0320 08:39:10.674199 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-ovn-kubernetes, name: monitor-ovn-node, uid: fd34ee7e-d9ac-4f68-acc8-b4d0a80bea68]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"f3437cbd-3241-4219-9ef3-5788faecde6f","controller":true,"blockOwnerDeletion":true}] 2026-03-20T08:39:10.674264953Z I0320 08:39:10.674229 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-dns-operator, name: dns-operator, uid: a7efef53-6225-4ab0-a67d-9f4e9c1d257a]" virtual=false 2026-03-20T08:39:10.677593450Z I0320 08:39:10.677553 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-service-ca-operator, name: service-ca-operator, uid: bf295607-109a-40e3-96e2-a4ae25967860]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}] 2026-03-20T08:39:10.677609731Z I0320 08:39:10.677584 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[monitoring.coreos.com/v1/ServiceMonitor, namespace: openshift-kube-scheduler, name: kube-scheduler, uid: dbcf3c76-b260-4105-837d-9f9e073796f2]" virtual=false kube-controller-manager_previous.log0000640000000000000000000003142215157203665033776 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-20T08:37:47.546461789Z I0320 08:37:47.546453 1 flags.go:64] FLAG: --pvclaimbinder-sync-period="15s" 2026-03-20T08:37:47.546461789Z I0320 08:37:47.546457 1 flags.go:64] FLAG: --requestheader-allowed-names="[]" 2026-03-20T08:37:47.546469149Z I0320 08:37:47.546462 1 flags.go:64] FLAG: --requestheader-client-ca-file="" 2026-03-20T08:37:47.546475759Z I0320 08:37:47.546465 1 flags.go:64] FLAG: --requestheader-extra-headers-prefix="[x-remote-extra-]" 2026-03-20T08:37:47.546482419Z I0320 08:37:47.546473 1 flags.go:64] FLAG: --requestheader-group-headers="[x-remote-group]" 2026-03-20T08:37:47.546482419Z I0320 08:37:47.546478 1 flags.go:64] FLAG: --requestheader-username-headers="[x-remote-user]" 2026-03-20T08:37:47.546489279Z I0320 08:37:47.546483 1 flags.go:64] FLAG: --resource-quota-sync-period="5m0s" 2026-03-20T08:37:47.546495900Z I0320 08:37:47.546487 1 flags.go:64] FLAG: --root-ca-file="/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt" 2026-03-20T08:37:47.546495900Z I0320 08:37:47.546492 1 flags.go:64] FLAG: --route-reconciliation-period="10s" 2026-03-20T08:37:47.546502750Z I0320 08:37:47.546496 1 flags.go:64] FLAG: --secondary-node-eviction-rate="0.01" 2026-03-20T08:37:47.546509370Z I0320 08:37:47.546501 1 flags.go:64] FLAG: --secure-port="10257" 2026-03-20T08:37:47.546509370Z I0320 08:37:47.546504 1 flags.go:64] FLAG: --service-account-private-key-file="/etc/kubernetes/secrets/service-account.key" 2026-03-20T08:37:47.546516260Z I0320 08:37:47.546509 1 flags.go:64] FLAG: --service-cluster-ip-range="172.30.0.0/16" 2026-03-20T08:37:47.546516260Z I0320 08:37:47.546513 1 flags.go:64] FLAG: --show-hidden-metrics-for-version="" 2026-03-20T08:37:47.546523130Z I0320 08:37:47.546516 1 flags.go:64] FLAG: --terminated-pod-gc-threshold="12500" 2026-03-20T08:37:47.546523130Z I0320 08:37:47.546520 1 flags.go:64] FLAG: --tls-cert-file="" 2026-03-20T08:37:47.546531581Z I0320 08:37:47.546525 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2026-03-20T08:37:47.546538221Z I0320 08:37:47.546530 1 flags.go:64] FLAG: --tls-min-version="" 2026-03-20T08:37:47.546538221Z I0320 08:37:47.546534 1 flags.go:64] FLAG: --tls-private-key-file="" 2026-03-20T08:37:47.546545101Z I0320 08:37:47.546538 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2026-03-20T08:37:47.546551761Z I0320 08:37:47.546544 1 flags.go:64] FLAG: --unhealthy-zone-threshold="0.55" 2026-03-20T08:37:47.546551761Z I0320 08:37:47.546549 1 flags.go:64] FLAG: --unsupported-kube-api-over-localhost="false" 2026-03-20T08:37:47.546558621Z I0320 08:37:47.546553 1 flags.go:64] FLAG: --use-service-account-credentials="true" 2026-03-20T08:37:47.546565222Z I0320 08:37:47.546557 1 flags.go:64] FLAG: --v="2" 2026-03-20T08:37:47.546571822Z I0320 08:37:47.546564 1 flags.go:64] FLAG: --version="false" 2026-03-20T08:37:47.546578422Z I0320 08:37:47.546570 1 flags.go:64] FLAG: --vmodule="" 2026-03-20T08:37:47.546896951Z W0320 08:37:47.546860 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDC 2026-03-20T08:37:47.546896951Z W0320 08:37:47.546871 1 feature_gate.go:330] unrecognized feature gate: RouteAdvertisements 2026-03-20T08:37:47.546896951Z W0320 08:37:47.546875 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImages 2026-03-20T08:37:47.546896951Z W0320 08:37:47.546879 1 feature_gate.go:330] unrecognized feature gate: EtcdBackendQuota 2026-03-20T08:37:47.546896951Z W0320 08:37:47.546883 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImagesAWS 2026-03-20T08:37:47.546896951Z W0320 08:37:47.546886 1 feature_gate.go:330] unrecognized feature gate: AlibabaPlatform 2026-03-20T08:37:47.546896951Z W0320 08:37:47.546890 1 feature_gate.go:330] unrecognized feature gate: AutomatedEtcdBackup 2026-03-20T08:37:47.546911592Z W0320 08:37:47.546895 1 feature_gate.go:353] Setting GA feature gate DisableKubeletCloudCredentialProviders=true. It will be removed in a future release. 2026-03-20T08:37:47.546911592Z W0320 08:37:47.546900 1 feature_gate.go:330] unrecognized feature gate: IngressControllerLBSubnetsAWS 2026-03-20T08:37:47.546911592Z W0320 08:37:47.546904 1 feature_gate.go:330] unrecognized feature gate: ConsolePluginContentSecurityPolicy 2026-03-20T08:37:47.546911592Z W0320 08:37:47.546908 1 feature_gate.go:330] unrecognized feature gate: SetEIPForNLBIngressController 2026-03-20T08:37:47.546919442Z W0320 08:37:47.546911 1 feature_gate.go:330] unrecognized feature gate: ImageStreamImportMode 2026-03-20T08:37:47.546952233Z W0320 08:37:47.546936 1 feature_gate.go:351] Setting deprecated feature gate KMSv1=true. It will be removed in a future release. 2026-03-20T08:37:47.546952233Z W0320 08:37:47.546944 1 feature_gate.go:330] unrecognized feature gate: NetworkLiveMigration 2026-03-20T08:37:47.546952233Z W0320 08:37:47.546948 1 feature_gate.go:330] unrecognized feature gate: MinimumKubeletVersion 2026-03-20T08:37:47.546960103Z W0320 08:37:47.546952 1 feature_gate.go:330] unrecognized feature gate: PlatformOperators 2026-03-20T08:37:47.546960103Z W0320 08:37:47.546956 1 feature_gate.go:330] unrecognized feature gate: OnClusterBuild 2026-03-20T08:37:47.546967033Z W0320 08:37:47.546959 1 feature_gate.go:330] unrecognized feature gate: NodeDisruptionPolicy 2026-03-20T08:37:47.546967033Z W0320 08:37:47.546963 1 feature_gate.go:330] unrecognized feature gate: SignatureStores 2026-03-20T08:37:47.546973924Z W0320 08:37:47.546967 1 feature_gate.go:330] unrecognized feature gate: OpenShiftPodSecurityAdmission 2026-03-20T08:37:47.546973924Z W0320 08:37:47.546970 1 feature_gate.go:330] unrecognized feature gate: OVNObservability 2026-03-20T08:37:47.546980844Z W0320 08:37:47.546974 1 feature_gate.go:330] unrecognized feature gate: MachineConfigNodes 2026-03-20T08:37:47.546980844Z W0320 08:37:47.546977 1 feature_gate.go:330] unrecognized feature gate: HardwareSpeed 2026-03-20T08:37:47.547017755Z W0320 08:37:47.546981 1 feature_gate.go:330] unrecognized feature gate: AdditionalRoutingCapabilities 2026-03-20T08:37:47.547026245Z W0320 08:37:47.547020 1 feature_gate.go:330] unrecognized feature gate: BareMetalLoadBalancer 2026-03-20T08:37:47.547032885Z W0320 08:37:47.547026 1 feature_gate.go:353] Setting GA feature gate CloudDualStackNodeIPs=true. It will be removed in a future release. 2026-03-20T08:37:47.547039546Z W0320 08:37:47.547031 1 feature_gate.go:330] unrecognized feature gate: Example 2026-03-20T08:37:47.547039546Z W0320 08:37:47.547036 1 feature_gate.go:330] unrecognized feature gate: GCPLabelsTags 2026-03-20T08:37:47.547046416Z W0320 08:37:47.547040 1 feature_gate.go:330] unrecognized feature gate: VSphereStaticIPs 2026-03-20T08:37:47.547046416Z W0320 08:37:47.547043 1 feature_gate.go:330] unrecognized feature gate: UpgradeStatus 2026-03-20T08:37:47.547053276Z W0320 08:37:47.547047 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiNetworks 2026-03-20T08:37:47.547059886Z W0320 08:37:47.547051 1 feature_gate.go:330] unrecognized feature gate: InsightsOnDemandDataGather 2026-03-20T08:37:47.547059886Z W0320 08:37:47.547055 1 feature_gate.go:330] unrecognized feature gate: GatewayAPI 2026-03-20T08:37:47.547071866Z W0320 08:37:47.547059 1 feature_gate.go:330] unrecognized feature gate: BuildCSIVolumes 2026-03-20T08:37:47.547071866Z W0320 08:37:47.547063 1 feature_gate.go:330] unrecognized feature gate: GCPClusterHostedDNS 2026-03-20T08:37:47.547071866Z W0320 08:37:47.547066 1 feature_gate.go:330] unrecognized feature gate: AWSEFSDriverVolumeMetrics 2026-03-20T08:37:47.547071866Z W0320 08:37:47.547069 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiVCenters 2026-03-20T08:37:47.547079627Z W0320 08:37:47.547074 1 feature_gate.go:330] unrecognized feature gate: MachineAPIOperatorDisableMachineHealthCheckController 2026-03-20T08:37:47.547110058Z W0320 08:37:47.547097 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDCWithUIDAndExtraClaimMappings 2026-03-20T08:37:47.547110058Z W0320 08:37:47.547104 1 feature_gate.go:330] unrecognized feature gate: PersistentIPsForVirtualization 2026-03-20T08:37:47.547110058Z W0320 08:37:47.547108 1 feature_gate.go:330] unrecognized feature gate: NetworkSegmentation 2026-03-20T08:37:47.547117708Z W0320 08:37:47.547111 1 feature_gate.go:330] unrecognized feature gate: ChunkSizeMiB 2026-03-20T08:37:47.547117708Z W0320 08:37:47.547114 1 feature_gate.go:330] unrecognized feature gate: InsightsConfig 2026-03-20T08:37:47.547124608Z W0320 08:37:47.547118 1 feature_gate.go:330] unrecognized feature gate: VSphereDriverConfiguration 2026-03-20T08:37:47.547124608Z W0320 08:37:47.547121 1 feature_gate.go:330] unrecognized feature gate: AzureWorkloadIdentity 2026-03-20T08:37:47.547131598Z W0320 08:37:47.547126 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstallIBMCloud 2026-03-20T08:37:47.547131598Z W0320 08:37:47.547129 1 feature_gate.go:330] unrecognized feature gate: IngressControllerDynamicConfigurationManager 2026-03-20T08:37:47.547138468Z W0320 08:37:47.547133 1 feature_gate.go:330] unrecognized feature gate: VSphereControlPlaneMachineSet 2026-03-20T08:37:47.547145099Z W0320 08:37:47.547137 1 feature_gate.go:353] Setting GA feature gate ValidatingAdmissionPolicy=true. It will be removed in a future release. 2026-03-20T08:37:47.547145099Z W0320 08:37:47.547141 1 feature_gate.go:330] unrecognized feature gate: ClusterMonitoringConfig 2026-03-20T08:37:47.547152039Z W0320 08:37:47.547146 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAWS 2026-03-20T08:37:47.547152039Z W0320 08:37:47.547149 1 feature_gate.go:330] unrecognized feature gate: CSIDriverSharedResource 2026-03-20T08:37:47.547158869Z W0320 08:37:47.547153 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAzure 2026-03-20T08:37:47.547217611Z W0320 08:37:47.547174 1 feature_gate.go:330] unrecognized feature gate: InsightsConfigAPI 2026-03-20T08:37:47.547217611Z W0320 08:37:47.547193 1 feature_gate.go:330] unrecognized feature gate: SigstoreImageVerification 2026-03-20T08:37:47.547217611Z W0320 08:37:47.547197 1 feature_gate.go:330] unrecognized feature gate: NetworkDiagnosticsConfig 2026-03-20T08:37:47.547217611Z W0320 08:37:47.547201 1 feature_gate.go:330] unrecognized feature gate: NutanixMultiSubnets 2026-03-20T08:37:47.547217611Z W0320 08:37:47.547207 1 feature_gate.go:330] unrecognized feature gate: PinnedImages 2026-03-20T08:37:47.547217611Z W0320 08:37:47.547211 1 feature_gate.go:330] unrecognized feature gate: InsightsRuntimeExtractor 2026-03-20T08:37:47.547217611Z W0320 08:37:47.547215 1 feature_gate.go:330] unrecognized feature gate: DNSNameResolver 2026-03-20T08:37:47.547240561Z W0320 08:37:47.547218 1 feature_gate.go:330] unrecognized feature gate: PrivateHostedZoneAWS 2026-03-20T08:37:47.547240561Z W0320 08:37:47.547221 1 feature_gate.go:330] unrecognized feature gate: AWSClusterHostedDNS 2026-03-20T08:37:47.547240561Z W0320 08:37:47.547225 1 feature_gate.go:330] unrecognized feature gate: VolumeGroupSnapshot 2026-03-20T08:37:47.547240561Z W0320 08:37:47.547228 1 feature_gate.go:330] unrecognized feature gate: MachineAPIMigration 2026-03-20T08:37:47.547240561Z W0320 08:37:47.547232 1 feature_gate.go:330] unrecognized feature gate: BootcNodeManagement 2026-03-20T08:37:47.547275162Z W0320 08:37:47.547262 1 feature_gate.go:330] unrecognized feature gate: MachineAPIProviderOpenStack 2026-03-20T08:37:47.547275162Z W0320 08:37:47.547270 1 feature_gate.go:330] unrecognized feature gate: MetricsCollectionProfiles 2026-03-20T08:37:47.547282323Z W0320 08:37:47.547275 1 feature_gate.go:330] unrecognized feature gate: AdminNetworkPolicy 2026-03-20T08:37:47.547282323Z W0320 08:37:47.547279 1 feature_gate.go:330] unrecognized feature gate: MixedCPUsAllocation 2026-03-20T08:37:47.547289223Z W0320 08:37:47.547283 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstall 2026-03-20T08:37:47.547289223Z W0320 08:37:47.547287 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallGCP 2026-03-20T08:37:47.547296073Z W0320 08:37:47.547290 1 feature_gate.go:330] unrecognized feature gate: NewOLM 2026-03-20T08:37:47.904489397Z I0320 08:37:47.904398 1 serving.go:380] Generated self-signed cert (/var/run/kubernetes/kube-controller-manager.crt, /var/run/kubernetes/kube-controller-manager.key) 2026-03-20T08:37:47.906290499Z I0320 08:37:47.906248 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/kubernetes/kube-controller-manager.crt::/var/run/kubernetes/kube-controller-manager.key" config/pod/kube-system/bootstrap-kube-controller-manager-master-0.json0000640000000000000000000002766215157203665024641 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-controller-manager-master-0","namespace":"kube-system","uid":"6a4dad0a-55bd-4b34-bab2-ec0b5f326c08","resourceVersion":"9109","creationTimestamp":"2026-03-20T08:35:25Z","labels":{"openshift.io/component":"controller-manager","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"46f265536aba6292ead501bc9b49f327","kubernetes.io/config.mirror":"46f265536aba6292ead501bc9b49f327","kubernetes.io/config.seen":"2026-03-20T08:33:49.482966410Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"7bc50120-3879-4454-8162-ec2f348aada5","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"etc-kubernetes-cloud","hostPath":{"path":"/etc/kubernetes/cloud","type":""}},{"name":"config","hostPath":{"path":"/etc/kubernetes/bootstrap-configs","type":""}},{"name":"ssl-certs-host","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["hyperkube","kube-controller-manager"],"args":["--openshift-config=/etc/kubernetes/config/kube-controller-manager-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2","--allocate-node-cidrs=false","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--cert-dir=/var/run/kubernetes","--cloud-provider=external","--cluster-cidr=10.128.0.0/16","--cluster-signing-cert-file=/etc/kubernetes/secrets/kubelet-signer.crt","--cluster-signing-duration=720h","--cluster-signing-key-file=/etc/kubernetes/secrets/kubelet-signer.key","--controllers=*","--controllers=-bootstrapsigner","--controllers=-tokencleaner","--controllers=-ttl","--enable-dynamic-provisioning=true","--feature-gates=AWSClusterHostedDNS=false","--feature-gates=AWSEFSDriverVolumeMetrics=true","--feature-gates=AdditionalRoutingCapabilities=false","--feature-gates=AdminNetworkPolicy=true","--feature-gates=AlibabaPlatform=true","--feature-gates=AutomatedEtcdBackup=false","--feature-gates=AzureWorkloadIdentity=true","--feature-gates=BareMetalLoadBalancer=true","--feature-gates=BootcNodeManagement=false","--feature-gates=BuildCSIVolumes=true","--feature-gates=CSIDriverSharedResource=false","--feature-gates=ChunkSizeMiB=true","--feature-gates=CloudDualStackNodeIPs=true","--feature-gates=ClusterAPIInstall=false","--feature-gates=ClusterAPIInstallIBMCloud=false","--feature-gates=ClusterMonitoringConfig=false","--feature-gates=ConsolePluginContentSecurityPolicy=false","--feature-gates=DNSNameResolver=false","--feature-gates=DisableKubeletCloudCredentialProviders=true","--feature-gates=DynamicResourceAllocation=false","--feature-gates=EtcdBackendQuota=false","--feature-gates=EventedPLEG=false","--feature-gates=Example=false","--feature-gates=ExternalOIDC=false","--feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false","--feature-gates=GCPClusterHostedDNS=false","--feature-gates=GCPLabelsTags=true","--feature-gates=GatewayAPI=false","--feature-gates=HardwareSpeed=true","--feature-gates=ImageStreamImportMode=false","--feature-gates=IngressControllerDynamicConfigurationManager=false","--feature-gates=IngressControllerLBSubnetsAWS=true","--feature-gates=InsightsConfig=false","--feature-gates=InsightsConfigAPI=false","--feature-gates=InsightsOnDemandDataGather=false","--feature-gates=InsightsRuntimeExtractor=false","--feature-gates=KMSv1=true","--feature-gates=MachineAPIMigration=false","--feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false","--feature-gates=MachineAPIProviderOpenStack=false","--feature-gates=MachineConfigNodes=false","--feature-gates=ManagedBootImages=true","--feature-gates=ManagedBootImagesAWS=true","--feature-gates=MaxUnavailableStatefulSet=false","--feature-gates=MetricsCollectionProfiles=false","--feature-gates=MinimumKubeletVersion=false","--feature-gates=MixedCPUsAllocation=false","--feature-gates=MultiArchInstallAWS=true","--feature-gates=MultiArchInstallAzure=false","--feature-gates=MultiArchInstallGCP=true","--feature-gates=NetworkDiagnosticsConfig=true","--feature-gates=NetworkLiveMigration=true","--feature-gates=NetworkSegmentation=true","--feature-gates=NewOLM=true","--feature-gates=NodeDisruptionPolicy=true","--feature-gates=NodeSwap=false","--feature-gates=NutanixMultiSubnets=false","--feature-gates=OVNObservability=false","--feature-gates=OnClusterBuild=true","--feature-gates=OpenShiftPodSecurityAdmission=false","--feature-gates=PersistentIPsForVirtualization=true","--feature-gates=PinnedImages=false","--feature-gates=PlatformOperators=false","--feature-gates=PrivateHostedZoneAWS=true","--feature-gates=ProcMountType=false","--feature-gates=RouteAdvertisements=false","--feature-gates=RouteExternalCertificate=false","--feature-gates=ServiceAccountTokenNodeBinding=false","--feature-gates=SetEIPForNLBIngressController=true","--feature-gates=SignatureStores=false","--feature-gates=SigstoreImageVerification=false","--feature-gates=StreamingCollectionEncodingToJSON=true","--feature-gates=StreamingCollectionEncodingToProtobuf=true","--feature-gates=TranslateStreamCloseWebsocketRequests=false","--feature-gates=UpgradeStatus=false","--feature-gates=UserNamespacesPodSecurityStandards=false","--feature-gates=UserNamespacesSupport=false","--feature-gates=VSphereControlPlaneMachineSet=true","--feature-gates=VSphereDriverConfiguration=true","--feature-gates=VSphereMultiNetworks=false","--feature-gates=VSphereMultiVCenters=true","--feature-gates=VSphereStaticIPs=true","--feature-gates=ValidatingAdmissionPolicy=true","--feature-gates=VolumeAttributesClass=false","--feature-gates=VolumeGroupSnapshot=false","--flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec","--kube-api-burst=300","--kube-api-qps=150","--leader-elect-renew-deadline=12s","--leader-elect-resource-lock=leases","--leader-elect-retry-period=3s","--leader-elect=true","--pv-recycler-pod-template-filepath-hostpath=","--pv-recycler-pod-template-filepath-nfs=","--root-ca-file=/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt","--secure-port=10257","--service-account-private-key-file=/etc/kubernetes/secrets/service-account.key","--service-cluster-ip-range=172.30.0.0/16","--use-service-account-credentials=true"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","command":["cluster-policy-controller","start"],"args":["--config=/etc/kubernetes/config/cluster-policy-controller-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--namespace=$(POD_NAMESPACE)","--v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:14Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:14Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:37:46Z","reason":"ContainersNotReady","message":"containers with unready status: [kube-controller-manager]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:37:46Z","reason":"ContainersNotReady","message":"containers with unready status: [kube-controller-manager]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:14Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-20T08:36:14Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2026-03-20T08:34:00Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","containerID":"cri-o://9adcc83ca09a3e8a61346c1bb76c593566cc39bfca1852854fa89f14749366d6","started":true},{"name":"kube-controller-manager","state":{"running":{"startedAt":"2026-03-20T08:38:47Z"}},"lastState":{"terminated":{"exitCode":2,"reason":"Error","startedAt":"2026-03-20T08:37:47Z","finishedAt":"2026-03-20T08:38:46Z","containerID":"cri-o://17402333a3400904f60b3f059728c9faa13bc6bb53c95e63d5e8325a42104e2f"}},"ready":false,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","containerID":"cri-o://8cdf7ffa9625537bd484b3cd72f3ca62a1fbd66303b800564461ec0e3e2735c7","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000001020415157203665044327 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-ff989d6cc-qcpb42026-03-20T08:38:47.303687106Z I0320 08:38:47.303454 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-20T08:38:47.303687106Z I0320 08:38:47.303611 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-20T08:38:47.305338035Z I0320 08:38:47.304139 1 observer_polling.go:159] Starting file observer 2026-03-20T08:38:49.674282447Z I0320 08:38:49.674176 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602261953.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-20T08:38:50.802331211Z I0320 08:38:50.800443 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-20T08:38:50.802331211Z W0320 08:38:50.800478 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-20T08:38:50.802331211Z W0320 08:38:50.800482 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-20T08:38:50.802331211Z W0320 08:38:50.800486 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-20T08:38:50.802331211Z W0320 08:38:50.800490 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-20T08:38:50.802331211Z W0320 08:38:50.800493 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-20T08:38:50.802331211Z W0320 08:38:50.800497 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-20T08:38:50.816113674Z I0320 08:38:50.815918 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-20T08:38:50.816113674Z I0320 08:38:50.816021 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-20T08:38:50.816113674Z I0320 08:38:50.816047 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-20T08:38:50.816146865Z I0320 08:38:50.816110 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-20T08:38:50.816146865Z I0320 08:38:50.816134 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-20T08:38:50.816157635Z I0320 08:38:50.816118 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-20T08:38:50.816167736Z I0320 08:38:50.816147 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-20T08:38:50.816247358Z I0320 08:38:50.816166 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-20T08:38:50.816382212Z I0320 08:38:50.816348 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-20T08:38:50.917232857Z I0320 08:38:50.917120 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-20T08:38:50.917261968Z I0320 08:38:50.917254 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-20T08:38:50.917429103Z I0320 08:38:50.917361 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-20T08:38:53.361710577Z I0320 08:38:53.361554 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-20T08:38:53.362420227Z I0320 08:38:53.362001 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... kube-controller-manager-operator_previous.log0000640000000000000000000003623215157203665044532 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-ff989d6cc-qcpb42026-03-20T08:37:25.615436734Z E0320 08:37:25.614801 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-20T08:37:25.616407343Z I0320 08:37:25.616263 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"26962f6d-26cd-465c-b3df-72f26b46c6c7", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-20T08:37:25.641027401Z I0320 08:37:25.640533 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-03-20T08:37:26.227570278Z E0320 08:37:26.227502 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-20T08:37:26.227627770Z I0320 08:37:26.227559 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"26962f6d-26cd-465c-b3df-72f26b46c6c7", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-20T08:37:29.766824132Z I0320 08:37:29.766701 1 request.go:700] Waited for 1.129183182s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/serviceaccounts/installer-sa 2026-03-20T08:37:35.194999260Z I0320 08:37:35.194911 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="17e4b71c19ee61ff665791d4c20775099b17327c2ae54e3c21a0f0c644904833") 2026-03-20T08:37:35.194999260Z W0320 08:37:35.194975 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-20T08:37:35.195057952Z I0320 08:37:35.195035 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="627edb43aeb3677c2a28cce35ab33c5164b2b4731f95e08211c2051f07bd35ad") 2026-03-20T08:37:35.195634589Z I0320 08:37:35.195591 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-20T08:37:35.195634589Z I0320 08:37:35.195628 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-20T08:37:35.196601477Z I0320 08:37:35.196557 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-20T08:37:35.197246456Z I0320 08:37:35.197199 1 base_controller.go:181] Shutting down kube-controller-manager ... 2026-03-20T08:37:35.197246456Z I0320 08:37:35.197239 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-20T08:37:35.197387570Z I0320 08:37:35.197343 1 base_controller.go:181] Shutting down SATokenSignerController ... 2026-03-20T08:37:35.197412521Z I0320 08:37:35.197395 1 base_controller.go:181] Shutting down GarbageCollectorWatcherController ... 2026-03-20T08:37:35.197422761Z I0320 08:37:35.197417 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-20T08:37:35.197449122Z I0320 08:37:35.197433 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-20T08:37:35.197457502Z I0320 08:37:35.197448 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-20T08:37:35.197492303Z I0320 08:37:35.197469 1 base_controller.go:181] Shutting down Installer ... 2026-03-20T08:37:35.197492303Z I0320 08:37:35.197488 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-20T08:37:35.197524114Z I0320 08:37:35.197507 1 base_controller.go:181] Shutting down kube-controller-manager-StaticPodState ... 2026-03-20T08:37:35.197555105Z I0320 08:37:35.197521 1 base_controller.go:181] Shutting down GuardController ... 2026-03-20T08:37:35.197563725Z I0320 08:37:35.197547 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-20T08:37:35.197571495Z I0320 08:37:35.197564 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-20T08:37:35.197583286Z I0320 08:37:35.197575 1 base_controller.go:181] Shutting down kube-controller-manager-InstallerState ... 2026-03-20T08:37:35.197653838Z I0320 08:37:35.197632 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-20T08:37:35.197665828Z I0320 08:37:35.197655 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-20T08:37:35.197693779Z I0320 08:37:35.197673 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-20T08:37:35.197693779Z I0320 08:37:35.197680 1 base_controller.go:123] Shutting down worker of GarbageCollectorWatcherController controller ... 2026-03-20T08:37:35.197704489Z I0320 08:37:35.197694 1 base_controller.go:113] All GarbageCollectorWatcherController workers have been terminated 2026-03-20T08:37:35.197704489Z I0320 08:37:35.197697 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-20T08:37:35.197726050Z I0320 08:37:35.197688 1 base_controller.go:181] Shutting down StatusSyncer_kube-controller-manager ... 2026-03-20T08:37:35.197735510Z I0320 08:37:35.197724 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-20T08:37:35.197735510Z I0320 08:37:35.197632 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-20T08:37:35.197744781Z I0320 08:37:35.197732 1 base_controller.go:159] All StatusSyncer_kube-controller-manager post start hooks have been terminated 2026-03-20T08:37:35.197744781Z I0320 08:37:35.197738 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-20T08:37:35.197789862Z I0320 08:37:35.197722 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-20T08:37:35.197789862Z I0320 08:37:35.197778 1 base_controller.go:181] Shutting down kube-controller-manager-Node ... 2026-03-20T08:37:35.197812683Z I0320 08:37:35.197717 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-20T08:37:35.197812683Z I0320 08:37:35.197784 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-controller-manager controller ... 2026-03-20T08:37:35.197812683Z I0320 08:37:35.197803 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-20T08:37:35.197812683Z I0320 08:37:35.197807 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-20T08:37:35.197826293Z I0320 08:37:35.197795 1 base_controller.go:123] Shutting down worker of kube-controller-manager-Node controller ... 2026-03-20T08:37:35.197826293Z I0320 08:37:35.197816 1 base_controller.go:181] Shutting down PruneController ... 2026-03-20T08:37:35.197826293Z I0320 08:37:35.197820 1 base_controller.go:113] All kube-controller-manager-Node workers have been terminated 2026-03-20T08:37:35.197836803Z I0320 08:37:35.197818 1 base_controller.go:123] Shutting down worker of kube-controller-manager controller ... 2026-03-20T08:37:35.197836803Z I0320 08:37:35.197832 1 controller_manager.go:54] kube-controller-manager-Node controller terminated 2026-03-20T08:37:35.197847424Z I0320 08:37:35.197838 1 base_controller.go:113] All kube-controller-manager workers have been terminated 2026-03-20T08:37:35.197847424Z I0320 08:37:35.197842 1 base_controller.go:123] Shutting down worker of kube-controller-manager-operator-UnsupportedConfigOverrides controller ... 2026-03-20T08:37:35.197857814Z I0320 08:37:35.197804 1 base_controller.go:113] All StatusSyncer_kube-controller-manager workers have been terminated 2026-03-20T08:37:35.197857814Z I0320 08:37:35.197779 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-20T08:37:35.197872464Z I0320 08:37:35.197749 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-20T08:37:35.197881495Z I0320 08:37:35.197867 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-20T08:37:35.197890195Z I0320 08:37:35.197879 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-20T08:37:35.197899595Z I0320 08:37:35.197675 1 base_controller.go:123] Shutting down worker of SATokenSignerController controller ... 2026-03-20T08:37:35.197899595Z I0320 08:37:35.197892 1 controller_manager.go:54] PruneController controller terminated 2026-03-20T08:37:35.197909345Z I0320 08:37:35.197899 1 base_controller.go:113] All SATokenSignerController workers have been terminated 2026-03-20T08:37:35.197909345Z I0320 08:37:35.197733 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-20T08:37:35.197944756Z I0320 08:37:35.197919 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-20T08:37:35.197944756Z I0320 08:37:35.197746 1 base_controller.go:123] Shutting down worker of kube-controller-manager-StaticPodState controller ... 2026-03-20T08:37:35.197944756Z I0320 08:37:35.197939 1 base_controller.go:113] All kube-controller-manager-StaticPodState workers have been terminated 2026-03-20T08:37:35.197956707Z I0320 08:37:35.197718 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-20T08:37:35.197956707Z I0320 08:37:35.197947 1 controller_manager.go:54] kube-controller-manager-StaticPodState controller terminated 2026-03-20T08:37:35.197956707Z I0320 08:37:35.197754 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-20T08:37:35.197968177Z I0320 08:37:35.197954 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-20T08:37:35.197968177Z I0320 08:37:35.197756 1 base_controller.go:181] Shutting down WorkerLatencyProfile ... 2026-03-20T08:37:35.197977987Z I0320 08:37:35.197965 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-20T08:37:35.197977987Z I0320 08:37:35.197972 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-20T08:37:35.197987198Z I0320 08:37:35.197976 1 controller_manager.go:54] GuardController controller terminated 2026-03-20T08:37:35.197987198Z I0320 08:37:35.197760 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-20T08:37:35.197987198Z I0320 08:37:35.197757 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-20T08:37:35.197995758Z I0320 08:37:35.197987 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-20T08:37:35.197995758Z I0320 08:37:35.197992 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-20T08:37:35.198003908Z I0320 08:37:35.197994 1 base_controller.go:113] All Installer workers have been terminated 2026-03-20T08:37:35.198003908Z I0320 08:37:35.197765 1 base_controller.go:123] Shutting down worker of kube-controller-manager-InstallerState controller ... 2026-03-20T08:37:35.198013068Z I0320 08:37:35.198001 1 controller_manager.go:54] Installer controller terminated 2026-03-20T08:37:35.198013068Z I0320 08:37:35.197764 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-20T08:37:35.198013068Z I0320 08:37:35.198007 1 base_controller.go:113] All kube-controller-manager-InstallerState workers have been terminated 2026-03-20T08:37:35.198023709Z I0320 08:37:35.198015 1 controller_manager.go:54] kube-controller-manager-InstallerState controller terminated 2026-03-20T08:37:35.198023709Z I0320 08:37:35.197782 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-20T08:37:35.198033409Z I0320 08:37:35.198015 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-20T08:37:35.198033409Z I0320 08:37:35.198022 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-20T08:37:35.198033409Z I0320 08:37:35.198028 1 controller_manager.go:54] RevisionController controller terminated 2026-03-20T08:37:35.198047529Z I0320 08:37:35.198039 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-20T08:37:35.198047529Z I0320 08:37:35.197795 1 base_controller.go:181] Shutting down kube-controller-manager-operator-UnsupportedConfigOverrides ... 2026-03-20T08:37:35.198057660Z I0320 08:37:35.198048 1 base_controller.go:113] All kube-controller-manager-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-20T08:37:35.198057660Z I0320 08:37:35.198054 1 controller_manager.go:54] kube-controller-manager-operator-UnsupportedConfigOverrides controller terminated 2026-03-20T08:37:35.198065910Z I0320 08:37:35.197853 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-20T08:37:35.198074620Z I0320 08:37:35.198065 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-20T08:37:35.198074620Z I0320 08:37:35.197906 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-3947539390/tls.crt::/tmp/serving-cert-3947539390/tls.key" 2026-03-20T08:37:35.198120262Z I0320 08:37:35.198096 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-20T08:37:35.198129152Z I0320 08:37:35.198118 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-20T08:37:35.198136662Z I0320 08:37:35.198127 1 builder.go:335] server exited 2026-03-20T08:37:35.199929274Z E0320 08:37:35.199889 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-20T08:37:35.201912362Z I0320 08:37:35.201885 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-20T08:37:35.201912362Z I0320 08:37:35.201902 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-20T08:37:40.194395576Z I0320 08:37:40.194291 1 observer_polling.go:162] Shutting down file observer 2026-03-20T08:38:09.200958927Z E0320 08:38:09.200834 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-20T08:38:09.200958927Z W0320 08:38:09.200903 1 leaderelection.go:84] leader election lost kube-controller-manager-operator-ff989d6cc-qcpb4.json0000640000000000000000000001450415157203665033450 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-ff989d6cc-qcpb4","generateName":"kube-controller-manager-operator-ff989d6cc-","namespace":"openshift-kube-controller-manager-operator","uid":"fa759777-de22-4440-a3d3-ad429a3b8e7b","resourceVersion":"9076","creationTimestamp":"2026-03-20T08:34:25Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"ff989d6cc"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.18/23\"],\"mac_address\":\"0a:58:0a:80:00:12\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.18/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.18\"\n ],\n \"mac\": \"0a:58:0a:80:00:12\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-ff989d6cc","uid":"34873764-a073-4777-9314-ca65cbb74e26","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:67c988e079558dc6b20232ebf9a7f7276fee60c756caed584c9715e0bec77a5a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:15Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:07Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:38:47Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:38:47Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.18","podIPs":[{"ip":"10.128.0.18"}],"startTime":"2026-03-20T08:36:07Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-03-20T08:38:47Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-20T08:36:19Z","finishedAt":"2026-03-20T08:38:09Z","containerID":"cri-o://9fc8932c5b9da1ed7961a714ed5b905683dbfe51746690c485563d67ef3b0b29"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","containerID":"cri-o://ef88f829645fabb894212937333305cd3d87e5b021830721d4e5e9b594609690","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-controller-manager/logs/installer-2-master-0/installer_current.log0000640000000000000000000001364115157203665031012 0ustar00000000000000002026-03-20T08:38:47.984846645Z I0320 08:38:47.984547 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc0007b2000 cert-dir:0xc0007b21e0 cert-secrets:0xc00086fea0 configmaps:0xc00086fa40 namespace:0xc00086f860 optional-cert-configmaps:0xc0007b2140 optional-configmaps:0xc00086fb80 optional-secrets:0xc00086fae0 pod:0xc00086f900 pod-manifest-dir:0xc00086fcc0 resource-dir:0xc00086fc20 revision:0xc00086f7c0 secrets:0xc00086f9a0 v:0xc0007b2f00] [0xc0007b2f00 0xc00086f7c0 0xc00086f860 0xc00086f900 0xc00086fc20 0xc00086fcc0 0xc00086fa40 0xc00086fb80 0xc00086f9a0 0xc00086fae0 0xc0007b21e0 0xc0007b2000 0xc0007b2140 0xc00086fea0] [] map[cert-configmaps:0xc0007b2000 cert-dir:0xc0007b21e0 cert-secrets:0xc00086fea0 configmaps:0xc00086fa40 help:0xc0007b32c0 kubeconfig:0xc00086f720 log-flush-frequency:0xc0007b2e60 namespace:0xc00086f860 optional-cert-configmaps:0xc0007b2140 optional-cert-secrets:0xc0007b20a0 optional-configmaps:0xc00086fb80 optional-secrets:0xc00086fae0 pod:0xc00086f900 pod-manifest-dir:0xc00086fcc0 pod-manifests-lock-file:0xc00086fe00 resource-dir:0xc00086fc20 revision:0xc00086f7c0 secrets:0xc00086f9a0 timeout-duration:0xc00086fd60 v:0xc0007b2f00 vmodule:0xc0007b2fa0] [0xc00086f720 0xc00086f7c0 0xc00086f860 0xc00086f900 0xc00086f9a0 0xc00086fa40 0xc00086fae0 0xc00086fb80 0xc00086fc20 0xc00086fcc0 0xc00086fd60 0xc00086fe00 0xc00086fea0 0xc0007b2000 0xc0007b20a0 0xc0007b2140 0xc0007b21e0 0xc0007b2e60 0xc0007b2f00 0xc0007b2fa0 0xc0007b32c0] [0xc0007b2000 0xc0007b21e0 0xc00086fea0 0xc00086fa40 0xc0007b32c0 0xc00086f720 0xc0007b2e60 0xc00086f860 0xc0007b2140 0xc0007b20a0 0xc00086fb80 0xc00086fae0 0xc00086f900 0xc00086fcc0 0xc00086fe00 0xc00086fc20 0xc00086f7c0 0xc00086f9a0 0xc00086fd60 0xc0007b2f00 0xc0007b2fa0] map[104:0xc0007b32c0 118:0xc0007b2f00] [] -1 0 0xc0007d7bc0 true 0x77ba20 []} 2026-03-20T08:38:47.985002069Z I0320 08:38:47.984871 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000310ea0)({ 2026-03-20T08:38:47.985002069Z KubeConfig: (string) "", 2026-03-20T08:38:47.985002069Z KubeClient: (kubernetes.Interface) , 2026-03-20T08:38:47.985002069Z Revision: (string) (len=1) "2", 2026-03-20T08:38:47.985002069Z NodeName: (string) "", 2026-03-20T08:38:47.985002069Z Namespace: (string) (len=33) "openshift-kube-controller-manager", 2026-03-20T08:38:47.985002069Z Clock: (clock.RealClock) { 2026-03-20T08:38:47.985002069Z }, 2026-03-20T08:38:47.985002069Z PodConfigMapNamePrefix: (string) (len=27) "kube-controller-manager-pod", 2026-03-20T08:38:47.985002069Z SecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-20T08:38:47.985002069Z (string) (len=27) "service-account-private-key", 2026-03-20T08:38:47.985002069Z (string) (len=31) "localhost-recovery-client-token" 2026-03-20T08:38:47.985002069Z }, 2026-03-20T08:38:47.985002069Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-20T08:38:47.985002069Z (string) (len=12) "serving-cert" 2026-03-20T08:38:47.985002069Z }, 2026-03-20T08:38:47.985002069Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-20T08:38:47.985002069Z (string) (len=27) "kube-controller-manager-pod", 2026-03-20T08:38:47.985002069Z (string) (len=6) "config", 2026-03-20T08:38:47.985002069Z (string) (len=32) "cluster-policy-controller-config", 2026-03-20T08:38:47.985002069Z (string) (len=29) "controller-manager-kubeconfig", 2026-03-20T08:38:47.985002069Z (string) (len=38) "kube-controller-cert-syncer-kubeconfig", 2026-03-20T08:38:47.985002069Z (string) (len=17) "serviceaccount-ca", 2026-03-20T08:38:47.985002069Z (string) (len=10) "service-ca", 2026-03-20T08:38:47.985002069Z (string) (len=15) "recycler-config" 2026-03-20T08:38:47.985002069Z }, 2026-03-20T08:38:47.985002069Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-20T08:38:47.985002069Z (string) (len=12) "cloud-config" 2026-03-20T08:38:47.985002069Z }, 2026-03-20T08:38:47.985002069Z CertSecretNames: ([]string) (len=2 cap=2) { 2026-03-20T08:38:47.985002069Z (string) (len=39) "kube-controller-manager-client-cert-key", 2026-03-20T08:38:47.985002069Z (string) (len=10) "csr-signer" 2026-03-20T08:38:47.985002069Z }, 2026-03-20T08:38:47.985002069Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-20T08:38:47.985002069Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-20T08:38:47.985002069Z (string) (len=20) "aggregator-client-ca", 2026-03-20T08:38:47.985002069Z (string) (len=9) "client-ca" 2026-03-20T08:38:47.985002069Z }, 2026-03-20T08:38:47.985002069Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-20T08:38:47.985002069Z (string) (len=17) "trusted-ca-bundle" 2026-03-20T08:38:47.985002069Z }, 2026-03-20T08:38:47.985002069Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-20T08:38:47.985002069Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-20T08:38:47.985002069Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-20T08:38:47.985002069Z Timeout: (time.Duration) 2m0s, 2026-03-20T08:38:47.985002069Z StaticPodManifestsLockFile: (string) "", 2026-03-20T08:38:47.985002069Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-20T08:38:47.985002069Z KubeletVersion: (string) "" 2026-03-20T08:38:47.985002069Z }) 2026-03-20T08:38:47.985750661Z I0320 08:38:47.985719 1 cmd.go:413] Getting controller reference for node master-0 2026-03-20T08:38:48.006315971Z I0320 08:38:47.998527 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-20T08:38:48.006315971Z I0320 08:38:47.998642 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-20T08:38:48.006315971Z I0320 08:38:47.998658 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-20T08:38:48.006315971Z I0320 08:38:48.001008 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715157203665027215 0ustar00000000000000002026-03-20T08:37:20.886214413Z I0320 08:37:20.885844 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc000b081e0 cert-dir:0xc000b083c0 cert-secrets:0xc000b08140 configmaps:0xc000aebc20 namespace:0xc000aeba40 optional-cert-configmaps:0xc000b08320 optional-cert-secrets:0xc000b08280 optional-configmaps:0xc000aebd60 optional-secrets:0xc000aebcc0 pod:0xc000aebae0 pod-manifest-dir:0xc000aebea0 resource-dir:0xc000aebe00 revision:0xc000aeb9a0 secrets:0xc000aebb80 v:0xc000b097c0] [0xc000b097c0 0xc000aeb9a0 0xc000aeba40 0xc000aebae0 0xc000aebe00 0xc000aebea0 0xc000aebc20 0xc000aebd60 0xc000aebb80 0xc000aebcc0 0xc000b083c0 0xc000b081e0 0xc000b08320 0xc000b08140 0xc000b08280] [] map[cert-configmaps:0xc000b081e0 cert-dir:0xc000b083c0 cert-secrets:0xc000b08140 configmaps:0xc000aebc20 help:0xc000b09b80 kubeconfig:0xc000aeb900 log-flush-frequency:0xc000b09720 namespace:0xc000aeba40 optional-cert-configmaps:0xc000b08320 optional-cert-secrets:0xc000b08280 optional-configmaps:0xc000aebd60 optional-secrets:0xc000aebcc0 pod:0xc000aebae0 pod-manifest-dir:0xc000aebea0 pod-manifests-lock-file:0xc000b080a0 resource-dir:0xc000aebe00 revision:0xc000aeb9a0 secrets:0xc000aebb80 timeout-duration:0xc000b08000 v:0xc000b097c0 vmodule:0xc000b09860] [0xc000aeb900 0xc000aeb9a0 0xc000aeba40 0xc000aebae0 0xc000aebb80 0xc000aebc20 0xc000aebcc0 0xc000aebd60 0xc000aebe00 0xc000aebea0 0xc000b08000 0xc000b080a0 0xc000b08140 0xc000b081e0 0xc000b08280 0xc000b08320 0xc000b083c0 0xc000b09720 0xc000b097c0 0xc000b09860 0xc000b09b80] [0xc000b081e0 0xc000b083c0 0xc000b08140 0xc000aebc20 0xc000b09b80 0xc000aeb900 0xc000b09720 0xc000aeba40 0xc000b08320 0xc000b08280 0xc000aebd60 0xc000aebcc0 0xc000aebae0 0xc000aebea0 0xc000b080a0 0xc000aebe00 0xc000aeb9a0 0xc000aebb80 0xc000b08000 0xc000b097c0 0xc000b09860] map[104:0xc000b09b80 118:0xc000b097c0] [] -1 0 0xc000ac3920 true 0xae2140 []} 2026-03-20T08:37:20.886421669Z I0320 08:37:20.886254 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0009a5380)({ 2026-03-20T08:37:20.886421669Z KubeConfig: (string) "", 2026-03-20T08:37:20.886421669Z KubeClient: (kubernetes.Interface) , 2026-03-20T08:37:20.886421669Z Revision: (string) (len=1) "1", 2026-03-20T08:37:20.886421669Z NodeName: (string) "", 2026-03-20T08:37:20.886421669Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-03-20T08:37:20.886421669Z Clock: (clock.RealClock) { 2026-03-20T08:37:20.886421669Z }, 2026-03-20T08:37:20.886421669Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-03-20T08:37:20.886421669Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-20T08:37:20.886421669Z (string) (len=11) "etcd-client", 2026-03-20T08:37:20.886421669Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-03-20T08:37:20.886421669Z (string) (len=31) "localhost-recovery-client-token" 2026-03-20T08:37:20.886421669Z }, 2026-03-20T08:37:20.886421669Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-20T08:37:20.886421669Z (string) (len=17) "encryption-config", 2026-03-20T08:37:20.886421669Z (string) (len=21) "webhook-authenticator" 2026-03-20T08:37:20.886421669Z }, 2026-03-20T08:37:20.886421669Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-20T08:37:20.886421669Z (string) (len=18) "kube-apiserver-pod", 2026-03-20T08:37:20.886421669Z (string) (len=6) "config", 2026-03-20T08:37:20.886421669Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-03-20T08:37:20.886421669Z (string) (len=28) "bound-sa-token-signing-certs", 2026-03-20T08:37:20.886421669Z (string) (len=15) "etcd-serving-ca", 2026-03-20T08:37:20.886421669Z (string) (len=18) "kubelet-serving-ca", 2026-03-20T08:37:20.886421669Z (string) (len=22) "sa-token-signing-certs", 2026-03-20T08:37:20.886421669Z (string) (len=29) "kube-apiserver-audit-policies" 2026-03-20T08:37:20.886421669Z }, 2026-03-20T08:37:20.886421669Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-20T08:37:20.886421669Z (string) (len=14) "oauth-metadata", 2026-03-20T08:37:20.886421669Z (string) (len=12) "cloud-config", 2026-03-20T08:37:20.886421669Z (string) (len=24) "kube-apiserver-server-ca" 2026-03-20T08:37:20.886421669Z }, 2026-03-20T08:37:20.886421669Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-03-20T08:37:20.886421669Z (string) (len=17) "aggregator-client", 2026-03-20T08:37:20.886421669Z (string) (len=30) "localhost-serving-cert-certkey", 2026-03-20T08:37:20.886421669Z (string) (len=31) "service-network-serving-certkey", 2026-03-20T08:37:20.886421669Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-03-20T08:37:20.886421669Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-03-20T08:37:20.886421669Z (string) (len=33) "bound-service-account-signing-key", 2026-03-20T08:37:20.886421669Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-03-20T08:37:20.886421669Z (string) (len=31) "check-endpoints-client-cert-key", 2026-03-20T08:37:20.886421669Z (string) (len=14) "kubelet-client", 2026-03-20T08:37:20.886421669Z (string) (len=16) "node-kubeconfigs" 2026-03-20T08:37:20.886421669Z }, 2026-03-20T08:37:20.886421669Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-03-20T08:37:20.886421669Z (string) (len=17) "user-serving-cert", 2026-03-20T08:37:20.886421669Z (string) (len=21) "user-serving-cert-000", 2026-03-20T08:37:20.886421669Z (string) (len=21) "user-serving-cert-001", 2026-03-20T08:37:20.886421669Z (string) (len=21) "user-serving-cert-002", 2026-03-20T08:37:20.886421669Z (string) (len=21) "user-serving-cert-003", 2026-03-20T08:37:20.886421669Z (string) (len=21) "user-serving-cert-004", 2026-03-20T08:37:20.886421669Z (string) (len=21) "user-serving-cert-005", 2026-03-20T08:37:20.886421669Z (string) (len=21) "user-serving-cert-006", 2026-03-20T08:37:20.886421669Z (string) (len=21) "user-serving-cert-007", 2026-03-20T08:37:20.886421669Z (string) (len=21) "user-serving-cert-008", 2026-03-20T08:37:20.886421669Z (string) (len=21) "user-serving-cert-009" 2026-03-20T08:37:20.886421669Z }, 2026-03-20T08:37:20.886421669Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-03-20T08:37:20.886421669Z (string) (len=20) "aggregator-client-ca", 2026-03-20T08:37:20.886421669Z (string) (len=9) "client-ca", 2026-03-20T08:37:20.886421669Z (string) (len=29) "control-plane-node-kubeconfig", 2026-03-20T08:37:20.886421669Z (string) (len=26) "check-endpoints-kubeconfig" 2026-03-20T08:37:20.886421669Z }, 2026-03-20T08:37:20.886421669Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-20T08:37:20.886421669Z (string) (len=17) "trusted-ca-bundle" 2026-03-20T08:37:20.886421669Z }, 2026-03-20T08:37:20.886421669Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-03-20T08:37:20.886421669Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-20T08:37:20.886421669Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-20T08:37:20.886421669Z Timeout: (time.Duration) 2m0s, 2026-03-20T08:37:20.886421669Z StaticPodManifestsLockFile: (string) "", 2026-03-20T08:37:20.886421669Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-20T08:37:20.886421669Z KubeletVersion: (string) "" 2026-03-20T08:37:20.886421669Z }) 2026-03-20T08:37:20.890303382Z I0320 08:37:20.888074 1 cmd.go:413] Getting controller reference for node master-0 2026-03-20T08:37:20.919864395Z I0320 08:37:20.919755 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-20T08:37:20.919864395Z I0320 08:37:20.919828 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-20T08:37:20.919864395Z I0320 08:37:20.919840 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-20T08:37:20.939078466Z I0320 08:37:20.938866 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-20T08:37:50.940076623Z I0320 08:37:50.939911 1 cmd.go:524] Getting installer pods for node master-0 2026-03-20T08:38:04.945322195Z F0320 08:38:04.943427 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115157203665022675 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"e1d21f11-7386-4a04-a82e-5a03f3602a3b","resourceVersion":"9002","creationTimestamp":"2026-03-20T08:37:08Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.59/23\"],\"mac_address\":\"0a:58:0a:80:00:3b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.59/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.59\"\n ],\n \"mac\": \"0a:58:0a:80:00:3b\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"37fb43e8-61a0-42c0-84e3-30817f637135"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:38:06Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:37:08Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:38:05Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:38:05Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:37:08Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.59","podIPs":[{"ip":"10.128.0.59"}],"startTime":"2026-03-20T08:37:08Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0320 08:37:20.888074 1 cmd.go:413] Getting controller reference for node master-0\nI0320 08:37:20.919755 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0320 08:37:20.919828 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0320 08:37:20.919840 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0320 08:37:20.938866 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0320 08:37:50.939911 1 cmd.go:524] Getting installer pods for node master-0\nF0320 08:38:04.943427 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-20T08:37:20Z","finishedAt":"2026-03-20T08:38:04Z","containerID":"cri-o://bf471cdb978763d680a893df02a2a47dbe930e97fc0ccb05e480229f6feda593"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","containerID":"cri-o://bf471cdb978763d680a893df02a2a47dbe930e97fc0ccb05e480229f6feda593","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615157203665035775 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-20T08:34:01.638549248Z I0320 08:34:01.638236 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000007344415157203665032701 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-20T08:39:01.515422973Z , Header: map[Content-Type:[text/plain; charset=utf-8] X-Content-Type-Options:[nosniff]] 2026-03-20T08:39:01.515422973Z > logger="UnhandledError" 2026-03-20T08:39:01.516499654Z I0320 08:39:01.516449 1 controller.go:126] OpenAPI AggregationController: action for item v1.project.openshift.io: Rate Limited Requeue. 2026-03-20T08:39:01.516615768Z I0320 08:39:01.516547 1 controller.go:109] OpenAPI AggregationController: action for item v1.project.openshift.io: Rate Limited Requeue. 2026-03-20T08:39:01.517830373Z W0320 08:39:01.517770 1 handler_proxy.go:100] no RequestInfo found in the context 2026-03-20T08:39:01.517830373Z E0320 08:39:01.517802 1 controller.go:102] "Unhandled Error" err=< 2026-03-20T08:39:01.517830373Z loading OpenAPI spec for "v1.quota.openshift.io" failed with: failed to download v1.quota.openshift.io: failed to retrieve openAPI spec, http error: ResponseCode: 503, Body: service unavailable 2026-03-20T08:39:01.517830373Z , Header: map[Content-Type:[text/plain; charset=utf-8] X-Content-Type-Options:[nosniff]] 2026-03-20T08:39:01.517830373Z > logger="UnhandledError" 2026-03-20T08:39:01.517910675Z W0320 08:39:01.517872 1 handler_proxy.go:100] no RequestInfo found in the context 2026-03-20T08:39:01.517969397Z E0320 08:39:01.517924 1 controller.go:113] "Unhandled Error" err="loading OpenAPI spec for \"v1.quota.openshift.io\" failed with: Error, could not get list of group versions for APIService" logger="UnhandledError" 2026-03-20T08:39:01.518975187Z I0320 08:39:01.518925 1 controller.go:109] OpenAPI AggregationController: action for item v1.quota.openshift.io: Rate Limited Requeue. 2026-03-20T08:39:01.518975187Z I0320 08:39:01.518955 1 controller.go:126] OpenAPI AggregationController: action for item v1.quota.openshift.io: Rate Limited Requeue. 2026-03-20T08:39:01.585103496Z I0320 08:39:01.584980 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:01.658222700Z I0320 08:39:01.658120 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:01.680710636Z I0320 08:39:01.680622 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:01.785076842Z I0320 08:39:01.784932 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:01.858116074Z I0320 08:39:01.858002 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:01.882266559Z I0320 08:39:01.880270 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:01.985016627Z I0320 08:39:01.984911 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:02.058263005Z I0320 08:39:02.058116 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:02.080340409Z I0320 08:39:02.080175 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:02.147400976Z E0320 08:39:02.145902 1 remote_available_controller.go:470] "Unhandled Error" err="v1.oauth.openshift.io failed with: failing or missing response from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: 401" logger="UnhandledError" 2026-03-20T08:39:02.185606671Z I0320 08:39:02.185531 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:02.258283332Z I0320 08:39:02.258161 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:02.279878162Z I0320 08:39:02.279813 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:02.385283968Z I0320 08:39:02.385124 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:02.457358202Z I0320 08:39:02.457276 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:02.481004852Z I0320 08:39:02.480908 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:02.586225792Z I0320 08:39:02.586096 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:02.600160839Z E0320 08:39:02.600073 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.55:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.55:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-03-20T08:39:02.657752840Z I0320 08:39:02.657670 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:02.681052400Z I0320 08:39:02.680908 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:02.784722225Z I0320 08:39:02.784598 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:02.857779587Z I0320 08:39:02.857710 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:02.880323775Z I0320 08:39:02.880218 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:02.984422823Z I0320 08:39:02.984329 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:03.012466211Z E0320 08:39:03.012362 1 remote_available_controller.go:470] "Unhandled Error" err="v1.user.openshift.io failed with: failing or missing response from https://10.128.0.45:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/user.openshift.io/v1: 401" logger="UnhandledError" 2026-03-20T08:39:03.058077102Z I0320 08:39:03.057976 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:03.080553638Z I0320 08:39:03.080502 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:03.184886113Z I0320 08:39:03.184770 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:03.258321366Z I0320 08:39:03.258157 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:03.280534435Z I0320 08:39:03.280449 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:03.391266386Z I0320 08:39:03.391124 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:03.457711355Z I0320 08:39:03.457397 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:03.480133799Z I0320 08:39:03.480062 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:03.585098913Z I0320 08:39:03.585013 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:03.658084433Z I0320 08:39:03.657985 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:03.680564609Z I0320 08:39:03.680487 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:03.784249624Z I0320 08:39:03.784136 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:03.858542003Z I0320 08:39:03.858452 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:03.881270096Z I0320 08:39:03.881044 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:03.985309462Z I0320 08:39:03.985156 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:04.058433206Z I0320 08:39:04.058283 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:04.080679625Z I0320 08:39:04.080567 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:04.184786823Z I0320 08:39:04.184675 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:04.258035511Z I0320 08:39:04.257922 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:04.280572928Z I0320 08:39:04.280400 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:04.385045597Z I0320 08:39:04.384922 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:04.481320626Z I0320 08:39:04.481123 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:04.584937180Z I0320 08:39:04.584822 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:04.680636242Z I0320 08:39:04.680513 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:04.785118532Z I0320 08:39:04.785019 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:04.880624109Z I0320 08:39:04.880501 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:04.984970684Z I0320 08:39:04.984876 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:05.080655086Z I0320 08:39:05.080567 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:05.280653623Z I0320 08:39:05.280541 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:05.480788843Z I0320 08:39:05.480693 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:05.679822782Z I0320 08:39:05.679734 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:05.880923040Z I0320 08:39:05.880802 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:06.080632458Z I0320 08:39:06.080513 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:06.281248043Z I0320 08:39:06.281138 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:06.480884139Z I0320 08:39:06.480736 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:06.706019099Z I0320 08:39:06.705931 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:06.880336436Z I0320 08:39:06.880262 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:07.081800065Z I0320 08:39:07.081681 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:07.281046210Z I0320 08:39:07.280945 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:07.486513356Z I0320 08:39:07.486423 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:07.684671289Z I0320 08:39:07.684571 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:07.776069696Z I0320 08:39:07.775974 1 cacher.go:1017] cacher (serviceaccounts): 1 objects queued in incoming channel. 2026-03-20T08:39:07.776069696Z I0320 08:39:07.776017 1 cacher.go:1017] cacher (serviceaccounts): 2 objects queued in incoming channel. 2026-03-20T08:39:07.783471842Z I0320 08:39:07.783422 1 cacher.go:1017] cacher (serviceaccounts): 3 objects queued in incoming channel. 2026-03-20T08:39:07.783539504Z I0320 08:39:07.783525 1 cacher.go:1017] cacher (serviceaccounts): 4 objects queued in incoming channel. 2026-03-20T08:39:07.795057661Z I0320 08:39:07.794985 1 cacher.go:1017] cacher (serviceaccounts): 5 objects queued in incoming channel. 2026-03-20T08:39:07.795168294Z I0320 08:39:07.795129 1 cacher.go:1017] cacher (serviceaccounts): 6 objects queued in incoming channel. 2026-03-20T08:39:07.821302506Z I0320 08:39:07.821233 1 cacher.go:1017] cacher (rolebindings.rbac.authorization.k8s.io): 3 objects queued in incoming channel. 2026-03-20T08:39:07.880351730Z I0320 08:39:07.880245 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:07.929109512Z I0320 08:39:07.929024 1 cacher.go:1017] cacher (rolebindings.rbac.authorization.k8s.io): 4 objects queued in incoming channel. 2026-03-20T08:39:07.988295460Z I0320 08:39:07.988218 1 cacher.go:1017] cacher (secrets): 3 objects queued in incoming channel. 2026-03-20T08:39:08.082269061Z I0320 08:39:08.080926 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:08.178480789Z I0320 08:39:08.178395 1 cacher.go:1017] cacher (secrets): 4 objects queued in incoming channel. 2026-03-20T08:39:08.250347776Z I0320 08:39:08.249879 1 cacher.go:1017] cacher (rolebindings.rbac.authorization.k8s.io): 5 objects queued in incoming channel. 2026-03-20T08:39:08.250347776Z I0320 08:39:08.249918 1 cacher.go:1017] cacher (rolebindings.rbac.authorization.k8s.io): 6 objects queued in incoming channel. 2026-03-20T08:39:08.280696262Z I0320 08:39:08.280620 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:08.448818598Z I0320 08:39:08.448725 1 cacher.go:1017] cacher (secrets): 5 objects queued in incoming channel. 2026-03-20T08:39:08.448818598Z I0320 08:39:08.448770 1 cacher.go:1017] cacher (secrets): 6 objects queued in incoming channel. 2026-03-20T08:39:08.481339337Z I0320 08:39:08.481263 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:08.681023245Z I0320 08:39:08.680471 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:08.884291757Z I0320 08:39:08.883790 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-20T08:39:09.081229094Z I0320 08:39:09.080455 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015157203665031155 0ustar00000000000000002026-03-20T08:33:58.058478596Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000004102015157203665037114 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-8b68b9d9b-c6vkz2026-03-20T08:38:59.441745308Z }) 2026-03-20T08:38:59.441745308Z I0320 08:37:20.888074 1 cmd.go:413] Getting controller reference for node master-0 2026-03-20T08:38:59.441745308Z I0320 08:37:20.919755 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-20T08:38:59.441745308Z I0320 08:37:20.919828 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-20T08:38:59.441745308Z I0320 08:37:20.919840 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-20T08:38:59.441745308Z I0320 08:37:20.938866 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-20T08:38:59.441745308Z I0320 08:37:50.939911 1 cmd.go:524] Getting installer pods for node master-0 2026-03-20T08:38:59.441745308Z F0320 08:38:04.943427 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-20T08:38:59.441776629Z I0320 08:38:59.441741 1 installer_controller.go:540] "master-0" moving to (v1.NodeStatus) { 2026-03-20T08:38:59.441776629Z NodeName: (string) (len=8) "master-0", 2026-03-20T08:38:59.441776629Z CurrentRevision: (int32) 0, 2026-03-20T08:38:59.441776629Z TargetRevision: (int32) 1, 2026-03-20T08:38:59.441776629Z LastFailedRevision: (int32) 1, 2026-03-20T08:38:59.441776629Z LastFailedTime: (*v1.Time)(0xc003822180)(2026-03-20 08:38:59.441542832 +0000 UTC m=+80.372831227), 2026-03-20T08:38:59.441776629Z LastFailedReason: (string) (len=15) "InstallerFailed", 2026-03-20T08:38:59.441776629Z LastFailedCount: (int) 1, 2026-03-20T08:38:59.441776629Z LastFallbackCount: (int) 0, 2026-03-20T08:38:59.441776629Z LastFailedRevisionErrors: ([]string) (len=1 cap=1) { 2026-03-20T08:38:59.441776629Z (string) (len=2059) "installer: ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) ,\n KubeletVersion: (string) \"\"\n})\nI0320 08:37:20.888074 1 cmd.go:413] Getting controller reference for node master-0\nI0320 08:37:20.919755 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0320 08:37:20.919828 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0320 08:37:20.919840 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0320 08:37:20.938866 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0320 08:37:50.939911 1 cmd.go:524] Getting installer pods for node master-0\nF0320 08:38:04.943427 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n" 2026-03-20T08:38:59.441776629Z } 2026-03-20T08:38:59.441776629Z } 2026-03-20T08:38:59.441776629Z because installer pod failed: installer: ving-cert", 2026-03-20T08:38:59.441776629Z (string) (len=21) "user-serving-cert-000", 2026-03-20T08:38:59.441776629Z (string) (len=21) "user-serving-cert-001", 2026-03-20T08:38:59.441776629Z (string) (len=21) "user-serving-cert-002", 2026-03-20T08:38:59.441776629Z (string) (len=21) "user-serving-cert-003", 2026-03-20T08:38:59.441776629Z (string) (len=21) "user-serving-cert-004", 2026-03-20T08:38:59.441776629Z (string) (len=21) "user-serving-cert-005", 2026-03-20T08:38:59.441776629Z (string) (len=21) "user-serving-cert-006", 2026-03-20T08:38:59.441776629Z (string) (len=21) "user-serving-cert-007", 2026-03-20T08:38:59.441776629Z (string) (len=21) "user-serving-cert-008", 2026-03-20T08:38:59.441776629Z (string) (len=21) "user-serving-cert-009" 2026-03-20T08:38:59.441776629Z }, 2026-03-20T08:38:59.441776629Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-03-20T08:38:59.441776629Z (string) (len=20) "aggregator-client-ca", 2026-03-20T08:38:59.441776629Z (string) (len=9) "client-ca", 2026-03-20T08:38:59.441776629Z (string) (len=29) "control-plane-node-kubeconfig", 2026-03-20T08:38:59.441776629Z (string) (len=26) "check-endpoints-kubeconfig" 2026-03-20T08:38:59.441776629Z }, 2026-03-20T08:38:59.441776629Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-20T08:38:59.441776629Z (string) (len=17) "trusted-ca-bundle" 2026-03-20T08:38:59.441776629Z }, 2026-03-20T08:38:59.441776629Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-03-20T08:38:59.441776629Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-20T08:38:59.441776629Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-20T08:38:59.441776629Z Timeout: (time.Duration) 2m0s, 2026-03-20T08:38:59.441776629Z StaticPodManifestsLockFile: (string) "", 2026-03-20T08:38:59.441776629Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-20T08:38:59.441776629Z KubeletVersion: (string) "" 2026-03-20T08:38:59.441776629Z }) 2026-03-20T08:38:59.441776629Z I0320 08:37:20.888074 1 cmd.go:413] Getting controller reference for node master-0 2026-03-20T08:38:59.441776629Z I0320 08:37:20.919755 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-20T08:38:59.441776629Z I0320 08:37:20.919828 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-20T08:38:59.441776629Z I0320 08:37:20.919840 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-20T08:38:59.441776629Z I0320 08:37:20.938866 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-20T08:38:59.441776629Z I0320 08:37:50.939911 1 cmd.go:524] Getting installer pods for node master-0 2026-03-20T08:38:59.441776629Z F0320 08:38:04.943427 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-20T08:38:59.444366365Z W0320 08:38:59.444332 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-03-20T08:38:59.444366365Z W0320 08:38:59.444355 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-03-20T08:38:59.444366365Z W0320 08:38:59.444361 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-20T08:38:59.729952009Z W0320 08:38:59.729854 1 degraded_webhook.go:147] failed to connect to webhook "machineautoscalers.autoscaling.openshift.io" via service "cluster-autoscaler-operator.openshift-machine-api.svc:443": dial tcp 172.30.86.183:443: connect: connection refused 2026-03-20T08:39:01.736439663Z E0320 08:39:01.736038 1 degraded_webhook.go:68] machineautoscalers.autoscaling.openshift.io: dial tcp 172.30.86.183:443: connect: connection refused 2026-03-20T08:39:01.749386821Z W0320 08:39:01.749311 1 degraded_webhook.go:147] failed to connect to webhook "alertmanagerconfigs.monitoring.coreos.com" via service "prometheus-operator-admission-webhook.openshift-monitoring.svc:8443": dial tcp 172.30.234.159:8443: connect: connection refused 2026-03-20T08:39:02.095882673Z I0320 08:39:02.095734 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-apiserver-operator", Name:"openshift-kube-apiserver-operator", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ObserveWebhookTokenAuthenticator' authentication-token webhook configuration status changed from false to true 2026-03-20T08:39:02.101114475Z I0320 08:39:02.101010 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-apiserver-operator", Name:"openshift-kube-apiserver-operator", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ObservedConfigChanged' Writing updated observed config:   map[string]any{ 2026-03-20T08:39:02.101114475Z    "admission": map[string]any{"pluginConfig": map[string]any{"PodSecurity": map[string]any{"configuration": map[string]any{"defaults": map[string]any{"audit": string("restricted"), "audit-version": string("latest"), "enforce": string("privileged"), "enforce-version": string("latest"), ...}}}, "network.openshift.io/ExternalIPRanger": map[string]any{"configuration": map[string]any{"allowIngressIP": bool(false), "apiVersion": string("network.openshift.io/v1"), "kind": string("ExternalIPRangerAdmissionConfig")}}, "network.openshift.io/RestrictedEndpointsAdmission": map[string]any{"configuration": map[string]any{"apiVersion": string("network.openshift.io/v1"), "kind": string("RestrictedEndpointsAdmissionConfig"), "restrictedCIDRs": []any{string("10.128.0.0/16"), string("172.30.0.0/16")}}}}}, 2026-03-20T08:39:02.101114475Z    "apiServerArguments": map[string]any{ 2026-03-20T08:39:02.101114475Z    "api-audiences": []any{string("https://kubernetes.default.svc")}, 2026-03-20T08:39:02.101114475Z +  "authentication-token-webhook-config-file": []any{ 2026-03-20T08:39:02.101114475Z +  string("/etc/kubernetes/static-pod-resources/secrets/webhook-authenticator/kubeConfig"), 2026-03-20T08:39:02.101114475Z +  }, 2026-03-20T08:39:02.101114475Z +  "authentication-token-webhook-version": []any{string("v1")}, 2026-03-20T08:39:02.101114475Z    "etcd-servers": []any{string("https://192.168.32.10:2379"), string("https://localhost:2379")}, 2026-03-20T08:39:02.101114475Z    "feature-gates": []any{string("AWSEFSDriverVolumeMetrics=true"), string("AdminNetworkPolicy=true"), string("AlibabaPlatform=true"), string("AzureWorkloadIdentity=true"), ...}, 2026-03-20T08:39:02.101114475Z    ... // 6 identical entries 2026-03-20T08:39:02.101114475Z    }, 2026-03-20T08:39:02.101114475Z    "corsAllowedOrigins": []any{string(`//127\.0\.0\.1(:|$)`), string("//localhost(:|$)")}, 2026-03-20T08:39:02.101114475Z    "gracefulTerminationDuration": string("15"), 2026-03-20T08:39:02.101114475Z    ... // 2 identical entries 2026-03-20T08:39:02.101114475Z   } 2026-03-20T08:39:02.113611880Z I0320 08:39:02.113510 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-apiserver-operator", Name:"openshift-kube-apiserver-operator", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/webhook-authenticator -n openshift-kube-apiserver because it was missing 2026-03-20T08:39:02.119923874Z I0320 08:39:02.119854 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-apiserver-operator", Name:"openshift-kube-apiserver-operator", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'StartingNewRevision' new revision 2 triggered by "optional secret/webhook-authenticator has been created" 2026-03-20T08:39:02.126356622Z I0320 08:39:02.126133 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:39:02.137017253Z I0320 08:39:02.136052 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:39:02.137713563Z I0320 08:39:02.137644 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-apiserver-operator", Name:"openshift-kube-apiserver-operator", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kube-apiserver-pod-2 -n openshift-kube-apiserver because it was missing 2026-03-20T08:39:02.450355397Z I0320 08:39:02.450262 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-apiserver-operator", Name:"openshift-kube-apiserver-operator", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/config-2 -n openshift-kube-apiserver because it was missing 2026-03-20T08:39:02.450772149Z I0320 08:39:02.450730 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:39:02.754143333Z W0320 08:39:02.754033 1 degraded_webhook.go:147] failed to connect to webhook "alertmanagerconfigs.monitoring.coreos.com" via service "prometheus-operator-admission-webhook.openshift-monitoring.svc:8443": dial tcp 172.30.234.159:8443: connect: connection refused 2026-03-20T08:39:03.443853441Z I0320 08:39:03.443742 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-apiserver-operator", Name:"openshift-kube-apiserver-operator", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-2 -n openshift-kube-apiserver because it was missing 2026-03-20T08:39:03.444246212Z I0320 08:39:03.444166 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:39:04.446310864Z I0320 08:39:04.446225 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-apiserver-operator", Name:"openshift-kube-apiserver-operator", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/bound-sa-token-signing-certs-2 -n openshift-kube-apiserver because it was missing 2026-03-20T08:39:04.446666734Z I0320 08:39:04.446593 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:39:05.445679219Z I0320 08:39:05.445587 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:39:05.445947637Z I0320 08:39:05.445915 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-apiserver-operator", Name:"openshift-kube-apiserver-operator", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/etcd-serving-ca-2 -n openshift-kube-apiserver because it was missing 2026-03-20T08:39:06.448497584Z I0320 08:39:06.448381 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:39:06.448872445Z I0320 08:39:06.448787 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-apiserver-operator", Name:"openshift-kube-apiserver-operator", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kube-apiserver-server-ca-2 -n openshift-kube-apiserver because it was missing 2026-03-20T08:39:07.445927492Z I0320 08:39:07.445842 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-apiserver-operator", Name:"openshift-kube-apiserver-operator", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kubelet-serving-ca-2 -n openshift-kube-apiserver because it was missing 2026-03-20T08:39:07.446405306Z I0320 08:39:07.446372 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:39:08.445806030Z I0320 08:39:08.445504 1 prune_controller.go:277] Nothing to prune 2026-03-20T08:39:08.445806030Z I0320 08:39:08.445568 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-apiserver-operator", Name:"openshift-kube-apiserver-operator", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/sa-token-signing-certs-2 -n openshift-kube-apiserver because it was missing kube-apiserver-operator_previous.log0000640000000000000000000004016415157203665037316 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-8b68b9d9b-c6vkz2026-03-20T08:37:33.423883046Z I0320 08:37:33.423866 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-20T08:37:33.423883046Z I0320 08:37:33.423870 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-20T08:37:33.423930337Z I0320 08:37:33.423907 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-20T08:37:33.423941677Z I0320 08:37:33.423930 1 base_controller.go:181] Shutting down cluster-kube-apiserver-operator-UnsupportedConfigOverrides ... 2026-03-20T08:37:33.423941677Z I0320 08:37:33.423934 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-20T08:37:33.423950528Z I0320 08:37:33.423943 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-20T08:37:33.423950528Z I0320 08:37:33.423945 1 base_controller.go:181] Shutting down SCCReconcileController ... 2026-03-20T08:37:33.423978668Z I0320 08:37:33.423956 1 base_controller.go:181] Shutting down webhookSupportabilityController ... 2026-03-20T08:37:33.424055831Z I0320 08:37:33.424034 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-20T08:37:33.424055831Z I0320 08:37:33.424046 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-20T08:37:33.424069041Z I0320 08:37:33.424062 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-20T08:37:33.424077671Z I0320 08:37:33.424068 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-20T08:37:33.424077671Z I0320 08:37:33.424074 1 builder.go:335] server exited 2026-03-20T08:37:33.424100642Z I0320 08:37:33.424085 1 base_controller.go:123] Shutting down worker of cluster-kube-apiserver-operator-UnsupportedConfigOverrides controller ... 2026-03-20T08:37:33.424100642Z I0320 08:37:33.424097 1 base_controller.go:113] All cluster-kube-apiserver-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-20T08:37:33.424114192Z I0320 08:37:33.424107 1 controller_manager.go:54] cluster-kube-apiserver-operator-UnsupportedConfigOverrides controller terminated 2026-03-20T08:37:33.424123873Z I0320 08:37:33.424119 1 base_controller.go:123] Shutting down worker of SCCReconcileController controller ... 2026-03-20T08:37:33.424131663Z I0320 08:37:33.424126 1 base_controller.go:113] All SCCReconcileController workers have been terminated 2026-03-20T08:37:33.424139863Z I0320 08:37:33.424085 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-20T08:37:33.424200585Z I0320 08:37:33.424166 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-20T08:37:33.424200585Z I0320 08:37:33.424169 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-20T08:37:33.424217745Z I0320 08:37:33.424204 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-20T08:37:33.424226646Z I0320 08:37:33.424219 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-20T08:37:33.424234996Z I0320 08:37:33.424219 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-20T08:37:33.424244886Z I0320 08:37:33.424239 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-20T08:37:33.424251576Z I0320 08:37:33.424241 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-20T08:37:33.424259067Z I0320 08:37:33.424252 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-20T08:37:33.424267557Z I0320 08:37:33.424257 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-20T08:37:33.424267557Z I0320 08:37:33.424262 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-20T08:37:33.424275027Z I0320 08:37:33.424266 1 controller_manager.go:54] GuardController controller terminated 2026-03-20T08:37:33.424283067Z I0320 08:37:33.424276 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-20T08:37:33.424289698Z I0320 08:37:33.424281 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-20T08:37:33.424296908Z I0320 08:37:33.424289 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-20T08:37:33.424304548Z I0320 08:37:33.424293 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-20T08:37:33.424304548Z I0320 08:37:33.424204 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-20T08:37:33.424312218Z I0320 08:37:33.424296 1 controller_manager.go:54] PruneController controller terminated 2026-03-20T08:37:33.424319678Z I0320 08:37:33.424229 1 base_controller.go:123] Shutting down worker of CertRotationTimeUpgradeableController controller ... 2026-03-20T08:37:33.424328519Z I0320 08:37:33.424321 1 base_controller.go:113] All CertRotationTimeUpgradeableController workers have been terminated 2026-03-20T08:37:33.424375390Z I0320 08:37:33.424362 1 base_controller.go:123] Shutting down worker of highCPUUsageAlertController controller ... 2026-03-20T08:37:33.424402361Z I0320 08:37:33.424377 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1915539435/tls.crt::/tmp/serving-cert-1915539435/tls.key" 2026-03-20T08:37:33.424433602Z I0320 08:37:33.424424 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-apiserver controller ... 2026-03-20T08:37:33.424456632Z I0320 08:37:33.424448 1 base_controller.go:113] All StatusSyncer_kube-apiserver workers have been terminated 2026-03-20T08:37:33.424480263Z I0320 08:37:33.423652 1 base_controller.go:181] Shutting down highCPUUsageAlertController ... 2026-03-20T08:37:33.424501954Z I0320 08:37:33.424493 1 base_controller.go:113] All highCPUUsageAlertController workers have been terminated 2026-03-20T08:37:33.424523874Z I0320 08:37:33.424496 1 base_controller.go:123] Shutting down worker of kube-apiserver-Node controller ... 2026-03-20T08:37:33.424571086Z I0320 08:37:33.424534 1 base_controller.go:123] Shutting down worker of kube-apiserver-StaticPodState controller ... 2026-03-20T08:37:33.424571086Z I0320 08:37:33.424560 1 base_controller.go:113] All kube-apiserver-StaticPodState workers have been terminated 2026-03-20T08:37:33.424571086Z I0320 08:37:33.424567 1 controller_manager.go:54] kube-apiserver-StaticPodState controller terminated 2026-03-20T08:37:33.424584386Z I0320 08:37:33.424572 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2026-03-20T08:37:33.424593926Z I0320 08:37:33.424548 1 base_controller.go:113] All kube-apiserver-Node workers have been terminated 2026-03-20T08:37:33.424593926Z I0320 08:37:33.424586 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2026-03-20T08:37:33.424603527Z I0320 08:37:33.424588 1 controller_manager.go:54] kube-apiserver-Node controller terminated 2026-03-20T08:37:33.424612417Z I0320 08:37:33.424521 1 base_controller.go:123] Shutting down worker of kube-apiserver-InstallerState controller ... 2026-03-20T08:37:33.424621447Z I0320 08:37:33.424612 1 base_controller.go:113] All kube-apiserver-InstallerState workers have been terminated 2026-03-20T08:37:33.424631358Z I0320 08:37:33.424619 1 controller_manager.go:54] kube-apiserver-InstallerState controller terminated 2026-03-20T08:37:33.424631358Z I0320 08:37:33.423397 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-20T08:37:33.424640168Z I0320 08:37:33.424515 1 base_controller.go:123] Shutting down worker of kube-apiserver-StartupMonitorPodCondition controller ... 2026-03-20T08:37:33.424648798Z I0320 08:37:33.424639 1 base_controller.go:113] All kube-apiserver-StartupMonitorPodCondition workers have been terminated 2026-03-20T08:37:33.424657298Z I0320 08:37:33.424647 1 controller_manager.go:54] kube-apiserver-StartupMonitorPodCondition controller terminated 2026-03-20T08:37:33.424665519Z I0320 08:37:33.424657 1 base_controller.go:123] Shutting down worker of EventWatchController controller ... 2026-03-20T08:37:33.424674019Z I0320 08:37:33.424665 1 base_controller.go:113] All EventWatchController workers have been terminated 2026-03-20T08:37:33.424739171Z I0320 08:37:33.424679 1 base_controller.go:123] Shutting down worker of ServiceAccountIssuerController controller ... 2026-03-20T08:37:33.424739171Z I0320 08:37:33.424720 1 base_controller.go:113] All ServiceAccountIssuerController workers have been terminated 2026-03-20T08:37:33.424739171Z I0320 08:37:33.424526 1 base_controller.go:123] Shutting down worker of kube-apiserver-StaticPodStateFallback controller ... 2026-03-20T08:37:33.424757111Z I0320 08:37:33.424735 1 base_controller.go:113] All kube-apiserver-StaticPodStateFallback workers have been terminated 2026-03-20T08:37:33.424757111Z I0320 08:37:33.424743 1 controller_manager.go:54] kube-apiserver-StaticPodStateFallback controller terminated 2026-03-20T08:37:33.424757111Z I0320 08:37:33.424742 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-20T08:37:33.424767082Z I0320 08:37:33.424758 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionState controller ... 2026-03-20T08:37:33.424774782Z I0320 08:37:33.424764 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-20T08:37:33.424774782Z I0320 08:37:33.424768 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionState workers have been terminated 2026-03-20T08:37:33.424782532Z I0320 08:37:33.424505 1 base_controller.go:123] Shutting down worker of KubeletVersionSkewController controller ... 2026-03-20T08:37:33.424792762Z I0320 08:37:33.424786 1 base_controller.go:113] All KubeletVersionSkewController workers have been terminated 2026-03-20T08:37:33.424802063Z I0320 08:37:33.424787 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-20T08:37:33.424802063Z I0320 08:37:33.424752 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionPrune controller ... 2026-03-20T08:37:33.424811403Z I0320 08:37:33.424803 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionPrune workers have been terminated 2026-03-20T08:37:33.424819733Z I0320 08:37:33.424778 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-20T08:37:33.424829003Z I0320 08:37:33.424820 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-20T08:37:33.424829003Z I0320 08:37:33.424823 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionMigration controller ... 2026-03-20T08:37:33.424838814Z I0320 08:37:33.424829 1 controller_manager.go:54] RevisionController controller terminated 2026-03-20T08:37:33.424847804Z I0320 08:37:33.424832 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionMigration workers have been terminated 2026-03-20T08:37:33.424847804Z I0320 08:37:33.424681 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-20T08:37:33.424885285Z I0320 08:37:33.424859 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-20T08:37:33.424885285Z I0320 08:37:33.424872 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-20T08:37:33.424885285Z I0320 08:37:33.424049 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-20T08:37:33.424896695Z I0320 08:37:33.424885 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-20T08:37:33.424923546Z I0320 08:37:33.424907 1 base_controller.go:123] Shutting down worker of kube-apiserver-RemoveStaleConditions controller ... 2026-03-20T08:37:33.424953177Z I0320 08:37:33.424942 1 base_controller.go:113] All kube-apiserver-RemoveStaleConditions workers have been terminated 2026-03-20T08:37:33.424986178Z I0320 08:37:33.424975 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionCondition controller ... 2026-03-20T08:37:33.425015899Z I0320 08:37:33.425005 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionCondition workers have been terminated 2026-03-20T08:37:33.425062050Z I0320 08:37:33.425034 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionKey controller ... 2026-03-20T08:37:33.425062050Z I0320 08:37:33.425052 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionKey workers have been terminated 2026-03-20T08:37:33.425101541Z I0320 08:37:33.425089 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-20T08:37:33.425130402Z I0320 08:37:33.425120 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-20T08:37:33.425279816Z I0320 08:37:33.425261 1 base_controller.go:123] Shutting down worker of NodeKubeconfigController controller ... 2026-03-20T08:37:33.425326608Z I0320 08:37:33.425315 1 base_controller.go:113] All NodeKubeconfigController workers have been terminated 2026-03-20T08:37:33.425354419Z E0320 08:37:33.425285 1 base_controller.go:279] "Unhandled Error" err="webhookSupportabilityController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-20T08:37:33.426580884Z I0320 08:37:33.426502 1 base_controller.go:123] Shutting down worker of webhookSupportabilityController controller ... 2026-03-20T08:37:33.426580884Z I0320 08:37:33.426567 1 base_controller.go:113] All webhookSupportabilityController workers have been terminated 2026-03-20T08:37:33.432962131Z E0320 08:37:33.432861 1 base_controller.go:279] "Unhandled Error" err="KubeAPIServerStaticResources-StaticResources reconciliation failed: [\"assets/kube-apiserver/storage-version-migration-flowschema.yaml\" (string): Get \"https://172.30.0.1:443/apis/migration.k8s.io/v1alpha1/storageversionmigrations/flowcontrol-flowschema-storage-version-migration\": context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/api-usage.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/audit-errors.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-requests.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-basic.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/podsecurity-violations.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-extended.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeAPIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-20T08:37:33.433299820Z W0320 08:37:33.433268 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-c6vkz.json0000640000000000000000000001362415157203665030111 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-8b68b9d9b-c6vkz","generateName":"kube-apiserver-operator-8b68b9d9b-","namespace":"openshift-kube-apiserver-operator","uid":"c1854ea4-c8e2-4289-84b6-1f18b2ac684f","resourceVersion":"9047","creationTimestamp":"2026-03-20T08:34:24Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"8b68b9d9b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.13/23\"],\"mac_address\":\"0a:58:0a:80:00:0d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.13/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.13\"\n ],\n \"mac\": \"0a:58:0a:80:00:0d\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-8b68b9d9b","uid":"65183d7c-fd2c-4094-ac5f-0c4a881976df","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:08Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:06Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:37:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:37:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.13","podIPs":[{"ip":"10.128.0.13"}],"startTime":"2026-03-20T08:36:06Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-03-20T08:37:39Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-20T08:36:07Z","finishedAt":"2026-03-20T08:37:33Z","containerID":"cri-o://f44e15f6f5dbc67eb3bd400bcba69ac1adc2aa6d2546e0cbc2778889121d3bcf"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","containerID":"cri-o://eedbb1dfd13f24b92d1505673b2418928be1e1bfdd5eb59005a694a899688fee","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007431615157203665025217 0ustar00000000000000002026-03-20T08:37:34.528411419Z cluster-etcd-operator rev \ 2026-03-20T08:37:34.528411419Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-03-20T08:37:34.528411419Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-03-20T08:37:34.528411419Z --client-key-file=$(ETCDCTL_KEY) \ 2026-03-20T08:37:34.528411419Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-03-20T08:37:34.528411419Z securityContext: 2026-03-20T08:37:34.528411419Z privileged: true 2026-03-20T08:37:34.528411419Z resources: 2026-03-20T08:37:34.528411419Z requests: 2026-03-20T08:37:34.528411419Z memory: 50Mi 2026-03-20T08:37:34.528411419Z cpu: 10m 2026-03-20T08:37:34.528411419Z env: 2026-03-20T08:37:34.528411419Z - name: "ALL_ETCD_ENDPOINTS" 2026-03-20T08:37:34.528411419Z value: "https://192.168.32.10:2379" 2026-03-20T08:37:34.528411419Z - name: "ETCDCTL_API" 2026-03-20T08:37:34.528411419Z value: "3" 2026-03-20T08:37:34.528411419Z - name: "ETCDCTL_CACERT" 2026-03-20T08:37:34.528411419Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-03-20T08:37:34.528411419Z - name: "ETCDCTL_CERT" 2026-03-20T08:37:34.528411419Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-03-20T08:37:34.528411419Z - name: "ETCDCTL_ENDPOINTS" 2026-03-20T08:37:34.528411419Z value: "https://192.168.32.10:2379" 2026-03-20T08:37:34.528411419Z - name: "ETCDCTL_KEY" 2026-03-20T08:37:34.528411419Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-03-20T08:37:34.528411419Z - name: "ETCD_CIPHER_SUITES" 2026-03-20T08:37:34.528411419Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-03-20T08:37:34.528411419Z - name: "ETCD_DATA_DIR" 2026-03-20T08:37:34.528411419Z value: "/var/lib/etcd" 2026-03-20T08:37:34.528411419Z - name: "ETCD_ELECTION_TIMEOUT" 2026-03-20T08:37:34.528411419Z value: "2500" 2026-03-20T08:37:34.528411419Z - name: "ETCD_ENABLE_PPROF" 2026-03-20T08:37:34.528539832Z value: "true" 2026-03-20T08:37:34.528539832Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-03-20T08:37:34.528539832Z value: "1" 2026-03-20T08:37:34.528539832Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-03-20T08:37:34.528539832Z value: "200ms" 2026-03-20T08:37:34.528539832Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-03-20T08:37:34.528539832Z value: "5s" 2026-03-20T08:37:34.528539832Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-03-20T08:37:34.528539832Z value: "500" 2026-03-20T08:37:34.528539832Z - name: "ETCD_IMAGE" 2026-03-20T08:37:34.528539832Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278" 2026-03-20T08:37:34.528539832Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-03-20T08:37:34.528539832Z value: "existing" 2026-03-20T08:37:34.528539832Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-03-20T08:37:34.528539832Z value: "8589934592" 2026-03-20T08:37:34.528539832Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-03-20T08:37:34.528539832Z value: "true" 2026-03-20T08:37:34.528539832Z - name: "ETCD_TLS_MIN_VERSION" 2026-03-20T08:37:34.528539832Z value: "TLS1.2" 2026-03-20T08:37:34.528539832Z - name: "NODE_master_0_ETCD_NAME" 2026-03-20T08:37:34.528539832Z value: "master-0" 2026-03-20T08:37:34.528539832Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-03-20T08:37:34.528539832Z value: "192.168.32.10" 2026-03-20T08:37:34.528539832Z - name: "NODE_master_0_IP" 2026-03-20T08:37:34.528539832Z value: "192.168.32.10" 2026-03-20T08:37:34.528539832Z volumeMounts: 2026-03-20T08:37:34.528539832Z - mountPath: /var/lib/etcd 2026-03-20T08:37:34.528539832Z name: data-dir 2026-03-20T08:37:34.528539832Z - mountPath: /etc/kubernetes/static-pod-certs 2026-03-20T08:37:34.528539832Z name: cert-dir 2026-03-20T08:37:34.528539832Z hostNetwork: true 2026-03-20T08:37:34.528539832Z priority: 2000001000 2026-03-20T08:37:34.528539832Z priorityClassName: system-node-critical 2026-03-20T08:37:34.528539832Z tolerations: 2026-03-20T08:37:34.528539832Z - operator: "Exists" 2026-03-20T08:37:34.528539832Z volumes: 2026-03-20T08:37:34.528539832Z - hostPath: 2026-03-20T08:37:34.528539832Z path: /etc/kubernetes/manifests 2026-03-20T08:37:34.528539832Z name: static-pod-dir 2026-03-20T08:37:34.528539832Z - hostPath: 2026-03-20T08:37:34.528539832Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-03-20T08:37:34.528539832Z name: resource-dir 2026-03-20T08:37:34.528539832Z - hostPath: 2026-03-20T08:37:34.528539832Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-03-20T08:37:34.528539832Z name: cert-dir 2026-03-20T08:37:34.528539832Z - hostPath: 2026-03-20T08:37:34.528539832Z path: /var/lib/etcd 2026-03-20T08:37:34.528539832Z type: "" 2026-03-20T08:37:34.528539832Z name: data-dir 2026-03-20T08:37:34.528539832Z - hostPath: 2026-03-20T08:37:34.528539832Z path: /usr/local/bin 2026-03-20T08:37:34.528539832Z name: usr-local-bin 2026-03-20T08:37:34.528539832Z - hostPath: 2026-03-20T08:37:34.528539832Z path: /var/log/etcd 2026-03-20T08:37:34.528539832Z name: log-dir 2026-03-20T08:37:34.528539832Z - hostPath: 2026-03-20T08:37:34.528539832Z path: /etc/kubernetes 2026-03-20T08:37:34.528539832Z name: config-dir 2026-03-20T08:37:34.528539832Z - hostPath: 2026-03-20T08:37:34.528539832Z path: /var/lib/etcd-auto-backup 2026-03-20T08:37:34.528539832Z name: etcd-auto-backup-dir 2026-03-20T08:37:34.533995301Z I0320 08:37:34.533926 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-03-20T08:37:34.534285890Z I0320 08:37:34.534227 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-20T08:37:34.534285890Z I0320 08:37:34.534241 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-20T08:37:34.534285890Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} 2026-03-20T08:37:48.723854468Z W0320 08:37:48.723618 1 recorder.go:207] Error creating event &Event{ObjectMeta:{installer-1-master-0.189e7fd4a68d4896.c63ac830 openshift-etcd 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-etcd,Name:installer-1-master-0,UID:4490a747-da2d-4f1a-8986-bc2c1c58424b,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:StaticPodInstallerCompleted,Message:Successfully installed revision 1,Source:EventSource{Component:static-pod-installer,Host:,},FirstTimestamp:2026-03-20 08:37:34.53462543 +0000 UTC m=+30.746293361,LastTimestamp:2026-03-20 08:37:34.53462543 +0000 UTC m=+30.746293361,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,}: Post "https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/events?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000000015615157203665023506 0ustar00000000000000002026-03-20T08:38:41.543010685Z I0320 08:38:41.542688 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000000050215157203665024203 0ustar00000000000000002026-03-20T08:38:31.255584250Z I0320 08:38:31.255344 1 readyz.go:175] Listening on 0.0.0.0:9980 2026-03-20T08:38:47.633476921Z I0320 08:38:47.632519 1 etcdcli_pool.go:70] creating a new cached client 2026-03-20T08:38:52.627247603Z I0320 08:38:52.625647 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000004121615157203665024362 0ustar00000000000000002026-03-20T08:38:30.986148177Z {"level":"info","ts":"2026-03-20T08:38:30.985605Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-20T08:38:30.986457066Z {"level":"info","ts":"2026-03-20T08:38:30.986382Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2026-03-20T08:38:30.987578079Z {"level":"info","ts":"2026-03-20T08:38:30.986561Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-20T08:38:30.987578079Z {"level":"info","ts":"2026-03-20T08:38:30.986638Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2026-03-20T08:38:30.987578079Z {"level":"info","ts":"2026-03-20T08:38:30.986687Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc000678000/192.168.32.10:9978\""} 2026-03-20T08:38:30.987578079Z {"level":"info","ts":"2026-03-20T08:38:30.986721Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc000678000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2026-03-20T08:38:30.987578079Z {"level":"info","ts":"2026-03-20T08:38:30.986730Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2026-03-20T08:38:30.987578079Z {"level":"info","ts":"2026-03-20T08:38:30.987392Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2026-03-20T08:38:30.987725293Z {"level":"info","ts":"2026-03-20T08:38:30.987569Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2026-03-20T08:38:30.987741673Z {"level":"info","ts":"2026-03-20T08:38:30.987711Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc000526de0 } }"} 2026-03-20T08:38:30.987802435Z {"level":"info","ts":"2026-03-20T08:38:30.987754Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2026-03-20T08:38:30.988317980Z {"level":"info","ts":"2026-03-20T08:38:30.988269Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2026-03-20T08:38:30.988317980Z {"level":"info","ts":"2026-03-20T08:38:30.988310Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2026-03-20T08:38:30.988443744Z {"level":"info","ts":"2026-03-20T08:38:30.988351Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-20T08:38:30.988443744Z {"level":"info","ts":"2026-03-20T08:38:30.988424Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-20T08:38:30.988764053Z {"level":"info","ts":"2026-03-20T08:38:30.988633Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001a8960, CONNECTING"} 2026-03-20T08:38:30.989261018Z {"level":"info","ts":"2026-03-20T08:38:30.989173Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-20T08:38:30.989295969Z {"level":"warn","ts":"2026-03-20T08:38:30.989262Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-20T08:38:30.989348880Z {"level":"info","ts":"2026-03-20T08:38:30.989316Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-20T08:38:30.989417992Z {"level":"info","ts":"2026-03-20T08:38:30.989289Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2026-03-20T08:38:30.989417992Z {"level":"info","ts":"2026-03-20T08:38:30.989388Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001a8960, TRANSIENT_FAILURE"} 2026-03-20T08:38:30.989430293Z {"level":"info","ts":"2026-03-20T08:38:30.989407Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2026-03-20T08:38:30.989440403Z {"level":"info","ts":"2026-03-20T08:38:30.989423Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2026-03-20T08:38:30.989450453Z {"level":"info","ts":"2026-03-20T08:38:30.989426Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2026-03-20T08:38:30.989476044Z {"level":"info","ts":"2026-03-20T08:38:30.989447Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-03-20T08:38:30.989486734Z {"level":"info","ts":"2026-03-20T08:38:30.989472Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-03-20T08:38:30.989623138Z {"level":"info","ts":"2026-03-20T08:38:30.989581Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2026-03-20T08:38:30.989623138Z {"level":"info","ts":"2026-03-20T08:38:30.989579Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2026-03-20T08:38:31.990256980Z {"level":"info","ts":"2026-03-20T08:38:31.990071Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-20T08:38:31.990311691Z {"level":"info","ts":"2026-03-20T08:38:31.990271Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001a8960, IDLE"} 2026-03-20T08:38:31.990550738Z {"level":"info","ts":"2026-03-20T08:38:31.990432Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-20T08:38:31.990605380Z {"level":"info","ts":"2026-03-20T08:38:31.990570Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-20T08:38:31.990917409Z {"level":"info","ts":"2026-03-20T08:38:31.990803Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001a8960, CONNECTING"} 2026-03-20T08:38:31.991508296Z {"level":"info","ts":"2026-03-20T08:38:31.991412Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-20T08:38:31.991550737Z {"level":"warn","ts":"2026-03-20T08:38:31.991513Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-20T08:38:31.991616459Z {"level":"info","ts":"2026-03-20T08:38:31.991583Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-20T08:38:31.991668751Z {"level":"info","ts":"2026-03-20T08:38:31.991637Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001a8960, TRANSIENT_FAILURE"} 2026-03-20T08:38:33.493470487Z {"level":"info","ts":"2026-03-20T08:38:33.493301Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-20T08:38:33.493470487Z {"level":"info","ts":"2026-03-20T08:38:33.493427Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001a8960, IDLE"} 2026-03-20T08:38:33.493546609Z {"level":"info","ts":"2026-03-20T08:38:33.493488Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-20T08:38:33.493546609Z {"level":"info","ts":"2026-03-20T08:38:33.493533Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-20T08:38:33.494001442Z {"level":"info","ts":"2026-03-20T08:38:33.493779Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001a8960, CONNECTING"} 2026-03-20T08:38:33.494287411Z {"level":"info","ts":"2026-03-20T08:38:33.494141Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-20T08:38:33.494359233Z {"level":"warn","ts":"2026-03-20T08:38:33.494299Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-20T08:38:33.494395724Z {"level":"info","ts":"2026-03-20T08:38:33.494371Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-20T08:38:33.494474996Z {"level":"info","ts":"2026-03-20T08:38:33.494433Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001a8960, TRANSIENT_FAILURE"} 2026-03-20T08:38:36.349547985Z {"level":"info","ts":"2026-03-20T08:38:36.349388Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-20T08:38:36.349547985Z {"level":"info","ts":"2026-03-20T08:38:36.349500Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001a8960, IDLE"} 2026-03-20T08:38:36.349618677Z {"level":"info","ts":"2026-03-20T08:38:36.349545Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-20T08:38:36.349618677Z {"level":"info","ts":"2026-03-20T08:38:36.349577Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-20T08:38:36.349755291Z {"level":"info","ts":"2026-03-20T08:38:36.349695Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001a8960, CONNECTING"} 2026-03-20T08:38:36.350125352Z {"level":"info","ts":"2026-03-20T08:38:36.350026Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-20T08:38:36.350138412Z {"level":"warn","ts":"2026-03-20T08:38:36.350117Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-20T08:38:36.350205164Z {"level":"info","ts":"2026-03-20T08:38:36.350166Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-20T08:38:36.350300867Z {"level":"info","ts":"2026-03-20T08:38:36.350263Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001a8960, TRANSIENT_FAILURE"} 2026-03-20T08:38:41.124896553Z {"level":"info","ts":"2026-03-20T08:38:41.124741Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-20T08:38:41.124896553Z {"level":"info","ts":"2026-03-20T08:38:41.124873Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001a8960, IDLE"} 2026-03-20T08:38:41.125011596Z {"level":"info","ts":"2026-03-20T08:38:41.124951Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-20T08:38:41.125045927Z {"level":"info","ts":"2026-03-20T08:38:41.125021Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-20T08:38:41.125263524Z {"level":"info","ts":"2026-03-20T08:38:41.125150Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001a8960, CONNECTING"} 2026-03-20T08:38:41.131979550Z {"level":"info","ts":"2026-03-20T08:38:41.131921Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2026-03-20T08:38:41.131979550Z {"level":"info","ts":"2026-03-20T08:38:41.131955Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001a8960, READY"} 2026-03-20T08:38:41.132103553Z {"level":"info","ts":"2026-03-20T08:38:41.132067Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2026-03-20T08:38:41.132103553Z {"level":"info","ts":"2026-03-20T08:38:41.132087Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000012311615157203665022716 0ustar00000000000000002026-03-20T08:38:42.091608285Z {"level":"info","ts":"2026-03-20T08:38:42.091579Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"91eb892c5ee87610 received MsgVoteResp from 91eb892c5ee87610 at term 4"} 2026-03-20T08:38:42.091630345Z {"level":"info","ts":"2026-03-20T08:38:42.091603Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"91eb892c5ee87610 became leader at term 4"} 2026-03-20T08:38:42.091649436Z {"level":"info","ts":"2026-03-20T08:38:42.091623Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 91eb892c5ee87610 elected leader 91eb892c5ee87610 at term 4"} 2026-03-20T08:38:42.096412085Z {"level":"info","ts":"2026-03-20T08:38:42.096279Z","caller":"etcdserver/server.go:2150","msg":"published local member to cluster through raft","local-member-id":"91eb892c5ee87610","local-member-attributes":"{Name:master-0 ClientURLs:[https://192.168.32.10:2379]}","request-path":"/0/members/91eb892c5ee87610/attributes","cluster-id":"a3c29fbf00fc418e","publish-timeout":"30s"} 2026-03-20T08:38:42.096412085Z {"level":"info","ts":"2026-03-20T08:38:42.096328Z","caller":"embed/serve.go:124","msg":"ready to serve client requests"} 2026-03-20T08:38:42.096412085Z {"level":"info","ts":"2026-03-20T08:38:42.096342Z","caller":"embed/serve.go:124","msg":"ready to serve client requests"} 2026-03-20T08:38:42.096723224Z {"level":"info","ts":"2026-03-20T08:38:42.096559Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-03-20T08:38:42.096723224Z {"level":"info","ts":"2026-03-20T08:38:42.096690Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-03-20T08:38:42.097615800Z {"level":"info","ts":"2026-03-20T08:38:42.097514Z","caller":"v3rpc/health.go:61","msg":"grpc service status changed","service":"","status":"SERVING"} 2026-03-20T08:38:42.097615800Z {"level":"info","ts":"2026-03-20T08:38:42.097571Z","caller":"v3rpc/health.go:61","msg":"grpc service status changed","service":"","status":"SERVING"} 2026-03-20T08:38:42.099744482Z {"level":"info","ts":"2026-03-20T08:38:42.099635Z","caller":"embed/serve.go:275","msg":"serving client traffic securely","traffic":"grpc+http","address":"[::]:2379"} 2026-03-20T08:38:42.100517425Z {"level":"info","ts":"2026-03-20T08:38:42.100364Z","caller":"embed/serve.go:275","msg":"serving client traffic securely","traffic":"grpc+http","address":"192.168.32.10:0"} 2026-03-20T08:38:46.541529784Z {"level":"warn","ts":"2026-03-20T08:38:46.541367Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"924.615612ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-config-managed/machine-approver\" ","response":"range_response_count:1 size:1065"} 2026-03-20T08:38:46.541529784Z {"level":"info","ts":"2026-03-20T08:38:46.541474Z","caller":"traceutil/trace.go:171","msg":"trace[494658932] range","detail":"{range_begin:/kubernetes.io/roles/openshift-config-managed/machine-approver; range_end:; response_count:1; response_revision:8967; }","duration":"924.786737ms","start":"2026-03-20T08:38:45.616670Z","end":"2026-03-20T08:38:46.541457Z","steps":["trace[494658932] 'range keys from in-memory index tree' (duration: 924.526819ms)"],"step_count":1} 2026-03-20T08:38:46.541601086Z {"level":"warn","ts":"2026-03-20T08:38:46.541511Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-20T08:38:45.616656Z","time spent":"924.845289ms","remote":"[::1]:35314","response type":"/etcdserverpb.KV/Range","request count":0,"request size":64,"response count":1,"response size":1089,"request content":"key:\"/kubernetes.io/roles/openshift-config-managed/machine-approver\" "} 2026-03-20T08:38:46.541705149Z {"level":"warn","ts":"2026-03-20T08:38:46.541664Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"924.739956ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-kube-scheduler/prometheus-k8s\" ","response":"range_response_count:1 size:864"} 2026-03-20T08:38:46.541730500Z {"level":"info","ts":"2026-03-20T08:38:46.541702Z","caller":"traceutil/trace.go:171","msg":"trace[1079922269] range","detail":"{range_begin:/kubernetes.io/roles/openshift-kube-scheduler/prometheus-k8s; range_end:; response_count:1; response_revision:8967; }","duration":"924.784407ms","start":"2026-03-20T08:38:45.616909Z","end":"2026-03-20T08:38:46.541693Z","steps":["trace[1079922269] 'range keys from in-memory index tree' (duration: 924.600582ms)"],"step_count":1} 2026-03-20T08:38:46.541773871Z {"level":"warn","ts":"2026-03-20T08:38:46.541736Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-20T08:38:45.616890Z","time spent":"924.838269ms","remote":"[::1]:35314","response type":"/etcdserverpb.KV/Range","request count":0,"request size":62,"response count":1,"response size":888,"request content":"key:\"/kubernetes.io/roles/openshift-kube-scheduler/prometheus-k8s\" "} 2026-03-20T08:38:46.541812503Z {"level":"warn","ts":"2026-03-20T08:38:46.541768Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"924.805848ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-controller-manager/prometheus-k8s\" ","response":"range_response_count:1 size:987"} 2026-03-20T08:38:46.541849324Z {"level":"info","ts":"2026-03-20T08:38:46.541818Z","caller":"traceutil/trace.go:171","msg":"trace[1842930497] range","detail":"{range_begin:/kubernetes.io/roles/openshift-controller-manager/prometheus-k8s; range_end:; response_count:1; response_revision:8967; }","duration":"924.864649ms","start":"2026-03-20T08:38:45.616944Z","end":"2026-03-20T08:38:46.541809Z","steps":["trace[1842930497] 'range keys from in-memory index tree' (duration: 924.641432ms)"],"step_count":1} 2026-03-20T08:38:46.541877894Z {"level":"warn","ts":"2026-03-20T08:38:46.541855Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-20T08:38:45.616937Z","time spent":"924.909561ms","remote":"[::1]:35314","response type":"/etcdserverpb.KV/Range","request count":0,"request size":66,"response count":1,"response size":1011,"request content":"key:\"/kubernetes.io/roles/openshift-controller-manager/prometheus-k8s\" "} 2026-03-20T08:38:46.542081710Z {"level":"warn","ts":"2026-03-20T08:38:46.542011Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"906.016159ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/prioritylevelconfigurations/\" range_end:\"/kubernetes.io/prioritylevelconfigurations0\" count_only:true ","response":"range_response_count:0 size:7"} 2026-03-20T08:38:46.542111611Z {"level":"info","ts":"2026-03-20T08:38:46.542079Z","caller":"traceutil/trace.go:171","msg":"trace[2059373411] range","detail":"{range_begin:/kubernetes.io/prioritylevelconfigurations/; range_end:/kubernetes.io/prioritylevelconfigurations0; response_count:0; response_revision:8967; }","duration":"906.109842ms","start":"2026-03-20T08:38:45.635958Z","end":"2026-03-20T08:38:46.542068Z","steps":["trace[2059373411] 'count revisions from in-memory index tree' (duration: 905.897156ms)"],"step_count":1} 2026-03-20T08:38:46.542148612Z {"level":"warn","ts":"2026-03-20T08:38:46.542117Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-20T08:38:45.635945Z","time spent":"906.162163ms","remote":"[::1]:35324","response type":"/etcdserverpb.KV/Range","request count":0,"request size":92,"response count":8,"response size":31,"request content":"key:\"/kubernetes.io/prioritylevelconfigurations/\" range_end:\"/kubernetes.io/prioritylevelconfigurations0\" count_only:true "} 2026-03-20T08:38:46.542201274Z {"level":"warn","ts":"2026-03-20T08:38:46.542157Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"925.143977ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-config-managed/cloud-credential-operator-role\" ","response":"range_response_count:1 size:964"} 2026-03-20T08:38:46.542253065Z {"level":"info","ts":"2026-03-20T08:38:46.542219Z","caller":"traceutil/trace.go:171","msg":"trace[2010226740] range","detail":"{range_begin:/kubernetes.io/roles/openshift-config-managed/cloud-credential-operator-role; range_end:; response_count:1; response_revision:8967; }","duration":"925.207789ms","start":"2026-03-20T08:38:45.617001Z","end":"2026-03-20T08:38:46.542209Z","steps":["trace[2010226740] 'range keys from in-memory index tree' (duration: 925.074675ms)"],"step_count":1} 2026-03-20T08:38:46.542287936Z {"level":"warn","ts":"2026-03-20T08:38:46.542257Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-20T08:38:45.616994Z","time spent":"925.25453ms","remote":"[::1]:35314","response type":"/etcdserverpb.KV/Range","request count":0,"request size":78,"response count":1,"response size":988,"request content":"key:\"/kubernetes.io/roles/openshift-config-managed/cloud-credential-operator-role\" "} 2026-03-20T08:38:46.542457691Z {"level":"warn","ts":"2026-03-20T08:38:46.542400Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"889.160017ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/infrastructure.cluster.x-k8s.io/metal3remediationtemplates/\" range_end:\"/kubernetes.io/infrastructure.cluster.x-k8s.io/metal3remediationtemplates0\" count_only:true ","response":"range_response_count:0 size:5"} 2026-03-20T08:38:46.542457691Z {"level":"warn","ts":"2026-03-20T08:38:46.542423Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"925.415295ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-kube-controller-manager/prometheus-k8s\" ","response":"range_response_count:1 size:1088"} 2026-03-20T08:38:46.542478192Z {"level":"info","ts":"2026-03-20T08:38:46.542450Z","caller":"traceutil/trace.go:171","msg":"trace[351489578] range","detail":"{range_begin:/kubernetes.io/roles/openshift-kube-controller-manager/prometheus-k8s; range_end:; response_count:1; response_revision:8967; }","duration":"925.448116ms","start":"2026-03-20T08:38:45.616994Z","end":"2026-03-20T08:38:46.542442Z","steps":["trace[351489578] 'range keys from in-memory index tree' (duration: 925.330673ms)"],"step_count":1} 2026-03-20T08:38:46.542509283Z {"level":"warn","ts":"2026-03-20T08:38:46.542477Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-20T08:38:45.616992Z","time spent":"925.478138ms","remote":"[::1]:35314","response type":"/etcdserverpb.KV/Range","request count":0,"request size":71,"response count":1,"response size":1112,"request content":"key:\"/kubernetes.io/roles/openshift-kube-controller-manager/prometheus-k8s\" "} 2026-03-20T08:38:46.542655107Z {"level":"warn","ts":"2026-03-20T08:38:46.542608Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"925.613402ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-kube-apiserver/prometheus-k8s\" ","response":"range_response_count:1 size:864"} 2026-03-20T08:38:46.542683238Z {"level":"info","ts":"2026-03-20T08:38:46.542651Z","caller":"traceutil/trace.go:171","msg":"trace[715976400] range","detail":"{range_begin:/kubernetes.io/roles/openshift-kube-apiserver/prometheus-k8s; range_end:; response_count:1; response_revision:8967; }","duration":"925.657263ms","start":"2026-03-20T08:38:45.616983Z","end":"2026-03-20T08:38:46.542640Z","steps":["trace[715976400] 'range keys from in-memory index tree' (duration: 925.517658ms)"],"step_count":1} 2026-03-20T08:38:46.542717619Z {"level":"warn","ts":"2026-03-20T08:38:46.542687Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-20T08:38:45.616977Z","time spent":"925.701084ms","remote":"[::1]:35314","response type":"/etcdserverpb.KV/Range","request count":0,"request size":62,"response count":1,"response size":888,"request content":"key:\"/kubernetes.io/roles/openshift-kube-apiserver/prometheus-k8s\" "} 2026-03-20T08:38:46.542868633Z {"level":"warn","ts":"2026-03-20T08:38:46.542832Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"925.844108ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-apiserver/prometheus-k8s\" ","response":"range_response_count:1 size:1060"} 2026-03-20T08:38:46.542901464Z {"level":"info","ts":"2026-03-20T08:38:46.542870Z","caller":"traceutil/trace.go:171","msg":"trace[316766641] range","detail":"{range_begin:/kubernetes.io/roles/openshift-apiserver/prometheus-k8s; range_end:; response_count:1; response_revision:8967; }","duration":"925.891429ms","start":"2026-03-20T08:38:45.616971Z","end":"2026-03-20T08:38:46.542862Z","steps":["trace[316766641] 'range keys from in-memory index tree' (duration: 925.734925ms)"],"step_count":1} 2026-03-20T08:38:46.542934345Z {"level":"warn","ts":"2026-03-20T08:38:46.542904Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-20T08:38:45.616965Z","time spent":"925.93218ms","remote":"[::1]:35314","response type":"/etcdserverpb.KV/Range","request count":0,"request size":57,"response count":1,"response size":1084,"request content":"key:\"/kubernetes.io/roles/openshift-apiserver/prometheus-k8s\" "} 2026-03-20T08:38:46.543018368Z {"level":"warn","ts":"2026-03-20T08:38:46.542987Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"926.010513ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-machine-api/cluster-autoscaler-operator\" ","response":"range_response_count:1 size:1555"} 2026-03-20T08:38:46.543053889Z {"level":"info","ts":"2026-03-20T08:38:46.543025Z","caller":"traceutil/trace.go:171","msg":"trace[906083564] range","detail":"{range_begin:/kubernetes.io/roles/openshift-machine-api/cluster-autoscaler-operator; range_end:; response_count:1; response_revision:8967; }","duration":"926.049054ms","start":"2026-03-20T08:38:45.616964Z","end":"2026-03-20T08:38:46.543013Z","steps":["trace[906083564] 'range keys from in-memory index tree' (duration: 925.885169ms)"],"step_count":1} 2026-03-20T08:38:46.543085660Z {"level":"warn","ts":"2026-03-20T08:38:46.543058Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-20T08:38:45.616961Z","time spent":"926.089855ms","remote":"[::1]:35314","response type":"/etcdserverpb.KV/Range","request count":0,"request size":72,"response count":1,"response size":1579,"request content":"key:\"/kubernetes.io/roles/openshift-machine-api/cluster-autoscaler-operator\" "} 2026-03-20T08:38:46.543135681Z {"level":"info","ts":"2026-03-20T08:38:46.542448Z","caller":"traceutil/trace.go:171","msg":"trace[1076326476] range","detail":"{range_begin:/kubernetes.io/infrastructure.cluster.x-k8s.io/metal3remediationtemplates/; range_end:/kubernetes.io/infrastructure.cluster.x-k8s.io/metal3remediationtemplates0; response_count:0; response_revision:8967; }","duration":"889.22923ms","start":"2026-03-20T08:38:45.653206Z","end":"2026-03-20T08:38:46.542436Z","steps":["trace[1076326476] 'count revisions from in-memory index tree' (duration: 889.093535ms)"],"step_count":1} 2026-03-20T08:38:46.543208163Z {"level":"warn","ts":"2026-03-20T08:38:46.543112Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"926.046284ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-console/prometheus-k8s\" ","response":"range_response_count:0 size:5"} 2026-03-20T08:38:46.543253015Z {"level":"warn","ts":"2026-03-20T08:38:46.543220Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"926.27774ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-console-operator/prometheus-k8s\" ","response":"range_response_count:0 size:5"} 2026-03-20T08:38:46.543288126Z {"level":"info","ts":"2026-03-20T08:38:46.543256Z","caller":"traceutil/trace.go:171","msg":"trace[335640172] range","detail":"{range_begin:/kubernetes.io/roles/openshift-console-operator/prometheus-k8s; range_end:; response_count:0; response_revision:8967; }","duration":"926.318992ms","start":"2026-03-20T08:38:45.616929Z","end":"2026-03-20T08:38:46.543248Z","steps":["trace[335640172] 'range keys from in-memory index tree' (duration: 926.086946ms)"],"step_count":1} 2026-03-20T08:38:46.543319817Z {"level":"warn","ts":"2026-03-20T08:38:46.543292Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-20T08:38:45.616923Z","time spent":"926.362324ms","remote":"[::1]:35314","response type":"/etcdserverpb.KV/Range","request count":0,"request size":64,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/roles/openshift-console-operator/prometheus-k8s\" "} 2026-03-20T08:38:46.543403149Z {"level":"warn","ts":"2026-03-20T08:38:46.543376Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"926.416805ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-image-registry/cluster-image-registry-operator\" ","response":"range_response_count:1 size:1482"} 2026-03-20T08:38:46.543433140Z {"level":"info","ts":"2026-03-20T08:38:46.543406Z","caller":"traceutil/trace.go:171","msg":"trace[54631282] range","detail":"{range_begin:/kubernetes.io/roles/openshift-image-registry/cluster-image-registry-operator; range_end:; response_count:1; response_revision:8967; }","duration":"926.448426ms","start":"2026-03-20T08:38:45.616948Z","end":"2026-03-20T08:38:46.543396Z","steps":["trace[54631282] 'range keys from in-memory index tree' (duration: 926.269831ms)"],"step_count":1} 2026-03-20T08:38:46.543461961Z {"level":"warn","ts":"2026-03-20T08:38:46.543436Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-20T08:38:45.616943Z","time spent":"926.486157ms","remote":"[::1]:35314","response type":"/etcdserverpb.KV/Range","request count":0,"request size":79,"response count":1,"response size":1506,"request content":"key:\"/kubernetes.io/roles/openshift-image-registry/cluster-image-registry-operator\" "} 2026-03-20T08:38:46.544061338Z {"level":"warn","ts":"2026-03-20T08:38:46.542128Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"925.107387ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-marketplace/marketplace-operator\" ","response":"range_response_count:1 size:1324"} 2026-03-20T08:38:46.544131590Z {"level":"info","ts":"2026-03-20T08:38:46.544069Z","caller":"traceutil/trace.go:171","msg":"trace[1544694341] range","detail":"{range_begin:/kubernetes.io/roles/openshift-marketplace/marketplace-operator; range_end:; response_count:1; response_revision:8967; }","duration":"927.044043ms","start":"2026-03-20T08:38:45.617009Z","end":"2026-03-20T08:38:46.544053Z","steps":["trace[1544694341] 'range keys from in-memory index tree' (duration: 925.045305ms)"],"step_count":1} 2026-03-20T08:38:46.544131590Z {"level":"warn","ts":"2026-03-20T08:38:46.542086Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"925.197439ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/\" range_end:\"/kubernetes.io/roles0\" count_only:true ","response":"range_response_count:0 size:7"} 2026-03-20T08:38:46.544177992Z {"level":"warn","ts":"2026-03-20T08:38:46.544134Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-20T08:38:45.617005Z","time spent":"927.111115ms","remote":"[::1]:35314","response type":"/etcdserverpb.KV/Range","request count":0,"request size":65,"response count":1,"response size":1348,"request content":"key:\"/kubernetes.io/roles/openshift-marketplace/marketplace-operator\" "} 2026-03-20T08:38:46.544204332Z {"level":"warn","ts":"2026-03-20T08:38:46.543145Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-20T08:38:45.653176Z","time spent":"889.957701ms","remote":"[::1]:35334","response type":"/etcdserverpb.KV/Range","request count":0,"request size":154,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/infrastructure.cluster.x-k8s.io/metal3remediationtemplates/\" range_end:\"/kubernetes.io/infrastructure.cluster.x-k8s.io/metal3remediationtemplates0\" count_only:true "} 2026-03-20T08:38:46.547859409Z {"level":"warn","ts":"2026-03-20T08:38:46.542606Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"882.879464ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/consoles/\" range_end:\"/kubernetes.io/config.openshift.io/consoles0\" count_only:true ","response":"range_response_count:0 size:7"} 2026-03-20T08:38:46.547997083Z {"level":"info","ts":"2026-03-20T08:38:46.547884Z","caller":"traceutil/trace.go:171","msg":"trace[1293802741] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/consoles/; range_end:/kubernetes.io/config.openshift.io/consoles0; response_count:0; response_revision:8967; }","duration":"888.155859ms","start":"2026-03-20T08:38:45.659687Z","end":"2026-03-20T08:38:46.547843Z","steps":["trace[1293802741] 'count revisions from in-memory index tree' (duration: 882.75357ms)"],"step_count":1} 2026-03-20T08:38:46.547997083Z {"level":"info","ts":"2026-03-20T08:38:46.544152Z","caller":"traceutil/trace.go:171","msg":"trace[579271496] range","detail":"{range_begin:/kubernetes.io/roles/; range_end:/kubernetes.io/roles0; response_count:0; response_revision:8967; }","duration":"927.27007ms","start":"2026-03-20T08:38:45.616855Z","end":"2026-03-20T08:38:46.544125Z","steps":["trace[579271496] 'count revisions from in-memory index tree' (duration: 925.013314ms)"],"step_count":1} 2026-03-20T08:38:46.548053705Z {"level":"warn","ts":"2026-03-20T08:38:46.548016Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-20T08:38:45.659673Z","time spent":"888.297492ms","remote":"[::1]:35336","response type":"/etcdserverpb.KV/Range","request count":0,"request size":94,"response count":1,"response size":31,"request content":"key:\"/kubernetes.io/config.openshift.io/consoles/\" range_end:\"/kubernetes.io/config.openshift.io/consoles0\" count_only:true "} 2026-03-20T08:38:46.548112716Z {"level":"warn","ts":"2026-03-20T08:38:46.548009Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-20T08:38:45.616837Z","time spent":"931.145733ms","remote":"[::1]:35314","response type":"/etcdserverpb.KV/Range","request count":0,"request size":48,"response count":110,"response size":31,"request content":"key:\"/kubernetes.io/roles/\" range_end:\"/kubernetes.io/roles0\" count_only:true "} 2026-03-20T08:38:46.548287622Z {"level":"info","ts":"2026-03-20T08:38:46.545880Z","caller":"traceutil/trace.go:171","msg":"trace[1037411880] range","detail":"{range_begin:/kubernetes.io/roles/openshift-console/prometheus-k8s; range_end:; response_count:0; response_revision:8967; }","duration":"928.834135ms","start":"2026-03-20T08:38:45.617028Z","end":"2026-03-20T08:38:46.545862Z","steps":["trace[1037411880] 'range keys from in-memory index tree' (duration: 925.987502ms)"],"step_count":1} 2026-03-20T08:38:46.548419995Z {"level":"warn","ts":"2026-03-20T08:38:46.548355Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-20T08:38:45.617021Z","time spent":"931.282017ms","remote":"[::1]:35314","response type":"/etcdserverpb.KV/Range","request count":0,"request size":55,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/roles/openshift-console/prometheus-k8s\" "} 2026-03-20T08:38:51.953922843Z {"level":"info","ts":"2026-03-20T08:38:51.953798Z","caller":"traceutil/trace.go:171","msg":"trace[141003628] range","detail":"{range_begin:/kubernetes.io/roles/openshift-insights/prometheus-k8s; range_end:; response_count:1; response_revision:9120; }","duration":"103.852041ms","start":"2026-03-20T08:38:51.849928Z","end":"2026-03-20T08:38:51.953781Z","steps":["trace[141003628] 'agreement among raft nodes before linearized reading' (duration: 103.82836ms)"],"step_count":1} 2026-03-20T08:38:51.954038356Z {"level":"info","ts":"2026-03-20T08:38:51.954004Z","caller":"traceutil/trace.go:171","msg":"trace[1176991351] range","detail":"{range_begin:/kubernetes.io/replicasets/openshift-authentication-operator/authentication-operator-5885bfd7f4; range_end:; response_count:1; response_revision:9120; }","duration":"105.131498ms","start":"2026-03-20T08:38:51.848725Z","end":"2026-03-20T08:38:51.953856Z","steps":["trace[1176991351] 'agreement among raft nodes before linearized reading' (duration: 105.094097ms)"],"step_count":1} 2026-03-20T08:38:57.403399933Z {"level":"info","ts":"2026-03-20T08:38:57.403305Z","caller":"traceutil/trace.go:171","msg":"trace[242789559] linearizableReadLoop","detail":"{readStateIndex:9577; appliedIndex:9576; }","duration":"245.115242ms","start":"2026-03-20T08:38:57.158172Z","end":"2026-03-20T08:38:57.403288Z","steps":["trace[242789559] 'read index received' (duration: 244.953937ms)","trace[242789559] 'applied index is now lower than readState.Index' (duration: 160.475µs)"],"step_count":2} 2026-03-20T08:38:57.403494616Z {"level":"info","ts":"2026-03-20T08:38:57.403405Z","caller":"traceutil/trace.go:171","msg":"trace[1277281540] transaction","detail":"{read_only:false; response_revision:9167; number_of_response:1; }","duration":"265.746004ms","start":"2026-03-20T08:38:57.137617Z","end":"2026-03-20T08:38:57.403363Z","steps":["trace[1277281540] 'process raft request' (duration: 265.535678ms)"],"step_count":1} 2026-03-20T08:38:57.403519747Z {"level":"warn","ts":"2026-03-20T08:38:57.403498Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"243.086513ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-kube-scheduler/localhost-recovery-client\" ","response":"range_response_count:1 size:247"} 2026-03-20T08:38:57.403544577Z {"level":"info","ts":"2026-03-20T08:38:57.403520Z","caller":"traceutil/trace.go:171","msg":"trace[1320418367] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-kube-scheduler/localhost-recovery-client; range_end:; response_count:1; response_revision:9167; }","duration":"243.101863ms","start":"2026-03-20T08:38:57.160408Z","end":"2026-03-20T08:38:57.403510Z","steps":["trace[1320418367] 'agreement among raft nodes before linearized reading' (duration: 243.063212ms)"],"step_count":1} 2026-03-20T08:38:57.403705312Z {"level":"info","ts":"2026-03-20T08:38:57.403678Z","caller":"traceutil/trace.go:171","msg":"trace[2089656140] range","detail":"{range_begin:/kubernetes.io/pods; range_end:; response_count:0; response_revision:9167; }","duration":"163.312495ms","start":"2026-03-20T08:38:57.240360Z","end":"2026-03-20T08:38:57.403672Z","steps":["trace[2089656140] 'agreement among raft nodes before linearized reading' (duration: 163.302085ms)"],"step_count":1} 2026-03-20T08:38:57.403737823Z {"level":"warn","ts":"2026-03-20T08:38:57.403445Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"245.254967ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/operatorgroups\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-20T08:38:57.403783734Z {"level":"info","ts":"2026-03-20T08:38:57.403685Z","caller":"traceutil/trace.go:171","msg":"trace[918302824] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:9167; }","duration":"145.439874ms","start":"2026-03-20T08:38:57.258207Z","end":"2026-03-20T08:38:57.403647Z","steps":["trace[918302824] 'agreement among raft nodes before linearized reading' (duration: 145.400503ms)"],"step_count":1} 2026-03-20T08:38:57.403815905Z {"level":"info","ts":"2026-03-20T08:38:57.403787Z","caller":"traceutil/trace.go:171","msg":"trace[686769232] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:9167; }","duration":"167.967791ms","start":"2026-03-20T08:38:57.235814Z","end":"2026-03-20T08:38:57.403782Z","steps":["trace[686769232] 'agreement among raft nodes before linearized reading' (duration: 167.945251ms)"],"step_count":1} 2026-03-20T08:38:57.403941809Z {"level":"warn","ts":"2026-03-20T08:38:57.403904Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"218.472675ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-20T08:38:57.403951909Z {"level":"info","ts":"2026-03-20T08:38:57.403936Z","caller":"traceutil/trace.go:171","msg":"trace[411294131] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:9167; }","duration":"218.567168ms","start":"2026-03-20T08:38:57.185362Z","end":"2026-03-20T08:38:57.403929Z","steps":["trace[411294131] 'agreement among raft nodes before linearized reading' (duration: 218.476165ms)"],"step_count":1} 2026-03-20T08:38:57.404112814Z {"level":"info","ts":"2026-03-20T08:38:57.404082Z","caller":"traceutil/trace.go:171","msg":"trace[1033678184] range","detail":"{range_begin:/kubernetes.io/clusterroles/operator-controller-proxy-role; range_end:; response_count:1; response_revision:9167; }","duration":"198.678687ms","start":"2026-03-20T08:38:57.205397Z","end":"2026-03-20T08:38:57.404075Z","steps":["trace[1033678184] 'agreement among raft nodes before linearized reading' (duration: 198.640926ms)"],"step_count":1} 2026-03-20T08:38:57.404132354Z {"level":"info","ts":"2026-03-20T08:38:57.403740Z","caller":"traceutil/trace.go:171","msg":"trace[1733632502] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/operatorgroups; range_end:; response_count:0; response_revision:9167; }","duration":"245.581976ms","start":"2026-03-20T08:38:57.158149Z","end":"2026-03-20T08:38:57.403731Z","steps":["trace[1733632502] 'agreement among raft nodes before linearized reading' (duration: 245.251156ms)"],"step_count":1} 2026-03-20T08:38:57.404252448Z {"level":"info","ts":"2026-03-20T08:38:57.404081Z","caller":"traceutil/trace.go:171","msg":"trace[1865030473] range","detail":"{range_begin:/kubernetes.io/pods; range_end:; response_count:0; response_revision:9167; }","duration":"122.192306ms","start":"2026-03-20T08:38:57.281883Z","end":"2026-03-20T08:38:57.404075Z","steps":["trace[1865030473] 'agreement among raft nodes before linearized reading' (duration: 122.179955ms)"],"step_count":1} 2026-03-20T08:38:57.673022561Z {"level":"info","ts":"2026-03-20T08:38:57.672833Z","caller":"traceutil/trace.go:171","msg":"trace[1518343785] linearizableReadLoop","detail":"{readStateIndex:9579; appliedIndex:9578; }","duration":"238.311605ms","start":"2026-03-20T08:38:57.434454Z","end":"2026-03-20T08:38:57.672765Z","steps":["trace[1518343785] 'read index received' (duration: 211.617456ms)","trace[1518343785] 'applied index is now lower than readState.Index' (duration: 26.693499ms)"],"step_count":2} 2026-03-20T08:38:57.673106194Z {"level":"warn","ts":"2026-03-20T08:38:57.673027Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"260.284376ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/mutatingwebhookconfigurations\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-20T08:38:57.673106194Z {"level":"info","ts":"2026-03-20T08:38:57.673057Z","caller":"traceutil/trace.go:171","msg":"trace[129819283] range","detail":"{range_begin:/kubernetes.io/mutatingwebhookconfigurations; range_end:; response_count:0; response_revision:9169; }","duration":"260.361028ms","start":"2026-03-20T08:38:57.412688Z","end":"2026-03-20T08:38:57.673049Z","steps":["trace[129819283] 'agreement among raft nodes before linearized reading' (duration: 260.281636ms)"],"step_count":1} 2026-03-20T08:38:57.673261988Z {"level":"warn","ts":"2026-03-20T08:38:57.673160Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"215.052646ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-20T08:38:57.673261988Z {"level":"info","ts":"2026-03-20T08:38:57.673240Z","caller":"traceutil/trace.go:171","msg":"trace[1352972892] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:9169; }","duration":"215.17559ms","start":"2026-03-20T08:38:57.458055Z","end":"2026-03-20T08:38:57.673231Z","steps":["trace[1352972892] 'agreement among raft nodes before linearized reading' (duration: 215.054466ms)"],"step_count":1} 2026-03-20T08:38:57.673285329Z {"level":"warn","ts":"2026-03-20T08:38:57.673249Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"234.260807ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/configmaps/openshift-kube-apiserver/kube-apiserver-audit-policies\" ","response":"range_response_count:1 size:1163"} 2026-03-20T08:38:57.673325650Z {"level":"info","ts":"2026-03-20T08:38:57.673290Z","caller":"traceutil/trace.go:171","msg":"trace[546198863] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-kube-apiserver/kube-apiserver-audit-policies; range_end:; response_count:1; response_revision:9169; }","duration":"234.293638ms","start":"2026-03-20T08:38:57.438982Z","end":"2026-03-20T08:38:57.673275Z","steps":["trace[546198863] 'agreement among raft nodes before linearized reading' (duration: 234.236576ms)"],"step_count":1} 2026-03-20T08:38:57.673956139Z {"level":"warn","ts":"2026-03-20T08:38:57.673161Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"235.632877ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/validatingadmissionpolicies/mcn-guards\" ","response":"range_response_count:1 size:1375"} 2026-03-20T08:38:57.673977589Z {"level":"info","ts":"2026-03-20T08:38:57.673957Z","caller":"traceutil/trace.go:171","msg":"trace[1572750102] range","detail":"{range_begin:/kubernetes.io/validatingadmissionpolicies/mcn-guards; range_end:; response_count:1; response_revision:9169; }","duration":"236.479992ms","start":"2026-03-20T08:38:57.437470Z","end":"2026-03-20T08:38:57.673950Z","steps":["trace[1572750102] 'agreement among raft nodes before linearized reading' (duration: 235.604766ms)"],"step_count":1} 2026-03-20T08:38:57.674040471Z {"level":"info","ts":"2026-03-20T08:38:57.673993Z","caller":"traceutil/trace.go:171","msg":"trace[1822892884] range","detail":"{range_begin:/kubernetes.io/events/openshift-kube-controller-manager-operator/; range_end:/kubernetes.io/events/openshift-kube-controller-manager-operator0; response_count:107; response_revision:9169; }","duration":"192.174469ms","start":"2026-03-20T08:38:57.481809Z","end":"2026-03-20T08:38:57.673984Z","steps":["trace[1822892884] 'agreement among raft nodes before linearized reading' (duration: 191.756176ms)"],"step_count":1} 2026-03-20T08:38:57.674040471Z {"level":"info","ts":"2026-03-20T08:38:57.672838Z","caller":"traceutil/trace.go:171","msg":"trace[62816035] transaction","detail":"{read_only:false; response_revision:9169; number_of_response:1; }","duration":"254.818466ms","start":"2026-03-20T08:38:57.417960Z","end":"2026-03-20T08:38:57.672778Z","steps":["trace[62816035] 'process raft request' (duration: 228.168179ms)","trace[62816035] 'compare' (duration: 26.512183ms)"],"step_count":2} 2026-03-20T08:38:57.896264856Z {"level":"info","ts":"2026-03-20T08:38:57.896079Z","caller":"traceutil/trace.go:171","msg":"trace[850908460] range","detail":"{range_begin:/kubernetes.io/apiregistration.k8s.io/apiservices/v1.user.openshift.io; range_end:; response_count:1; response_revision:9170; }","duration":"118.707924ms","start":"2026-03-20T08:38:57.777350Z","end":"2026-03-20T08:38:57.896058Z","steps":["trace[850908460] 'range keys from in-memory index tree' (duration: 118.492298ms)"],"step_count":1} 2026-03-20T08:38:57.896264856Z {"level":"info","ts":"2026-03-20T08:38:57.896147Z","caller":"traceutil/trace.go:171","msg":"trace[343250441] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators/machine-api; range_end:; response_count:1; response_revision:9170; }","duration":"118.766476ms","start":"2026-03-20T08:38:57.777351Z","end":"2026-03-20T08:38:57.896117Z","steps":["trace[343250441] 'range keys from in-memory index tree' (duration: 118.525289ms)"],"step_count":1} 2026-03-20T08:38:57.896345389Z {"level":"info","ts":"2026-03-20T08:38:57.896209Z","caller":"traceutil/trace.go:171","msg":"trace[1518398335] linearizableReadLoop","detail":"{readStateIndex:9581; appliedIndex:9580; }","duration":"117.247942ms","start":"2026-03-20T08:38:57.778924Z","end":"2026-03-20T08:38:57.896172Z","steps":["trace[1518398335] 'read index received' (duration: 108.041713ms)","trace[1518398335] 'applied index is now lower than readState.Index' (duration: 9.204519ms)"],"step_count":2} 2026-03-20T08:38:57.896345389Z {"level":"info","ts":"2026-03-20T08:38:57.896280Z","caller":"traceutil/trace.go:171","msg":"trace[1121410056] transaction","detail":"{read_only:false; response_revision:9171; number_of_response:1; }","duration":"117.632762ms","start":"2026-03-20T08:38:57.778635Z","end":"2026-03-20T08:38:57.896267Z","steps":["trace[1121410056] 'process raft request' (duration: 108.422504ms)"],"step_count":1} 2026-03-20T08:38:57.896376000Z {"level":"info","ts":"2026-03-20T08:38:57.896350Z","caller":"traceutil/trace.go:171","msg":"trace[1806626910] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:9171; }","duration":"110.947198ms","start":"2026-03-20T08:38:57.785396Z","end":"2026-03-20T08:38:57.896343Z","steps":["trace[1806626910] 'agreement among raft nodes before linearized reading' (duration: 110.906466ms)"],"step_count":1} 2026-03-20T08:38:57.896502593Z {"level":"info","ts":"2026-03-20T08:38:57.896399Z","caller":"traceutil/trace.go:171","msg":"trace[1404417371] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook; range_end:; response_count:1; response_revision:9171; }","duration":"117.494999ms","start":"2026-03-20T08:38:57.778869Z","end":"2026-03-20T08:38:57.896364Z","steps":["trace[1404417371] 'agreement among raft nodes before linearized reading' (duration: 117.419427ms)"],"step_count":1} 2026-03-20T08:38:58.246930190Z {"level":"warn","ts":"2026-03-20T08:38:58.246417Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"214.056847ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/mutatingwebhookconfigurations\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-20T08:38:58.246930190Z {"level":"warn","ts":"2026-03-20T08:38:58.246499Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"241.160058ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterrolebindings/operator-controller-manager-rolebinding\" ","response":"range_response_count:1 size:550"} 2026-03-20T08:38:58.246930190Z {"level":"info","ts":"2026-03-20T08:38:58.246547Z","caller":"traceutil/trace.go:171","msg":"trace[556720741] range","detail":"{range_begin:/kubernetes.io/mutatingwebhookconfigurations; range_end:; response_count:0; response_revision:9171; }","duration":"214.239322ms","start":"2026-03-20T08:38:58.032289Z","end":"2026-03-20T08:38:58.246528Z","steps":["trace[556720741] 'range keys from in-memory index tree' (duration: 213.947293ms)"],"step_count":1} 2026-03-20T08:38:58.246930190Z {"level":"info","ts":"2026-03-20T08:38:58.246610Z","caller":"traceutil/trace.go:171","msg":"trace[2118482114] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/operator-controller-manager-rolebinding; range_end:; response_count:1; response_revision:9171; }","duration":"241.331293ms","start":"2026-03-20T08:38:58.005257Z","end":"2026-03-20T08:38:58.246588Z","steps":["trace[2118482114] 'range keys from in-memory index tree' (duration: 240.968052ms)"],"step_count":1} 2026-03-20T08:38:58.246930190Z {"level":"warn","ts":"2026-03-20T08:38:58.246805Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"207.175776ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/pods/openshift-kube-apiserver/kube-apiserver-master-0\" ","response":"range_response_count:0 size:5"} 2026-03-20T08:38:58.246930190Z {"level":"info","ts":"2026-03-20T08:38:58.246817Z","caller":"traceutil/trace.go:171","msg":"trace[1275911854] range","detail":"{range_begin:/kubernetes.io/pods; range_end:; response_count:0; response_revision:9171; }","duration":"164.775699ms","start":"2026-03-20T08:38:58.082029Z","end":"2026-03-20T08:38:58.246805Z","steps":["trace[1275911854] 'range keys from in-memory index tree' (duration: 164.658365ms)"],"step_count":1} 2026-03-20T08:38:58.246930190Z {"level":"info","ts":"2026-03-20T08:38:58.246836Z","caller":"traceutil/trace.go:171","msg":"trace[975991524] range","detail":"{range_begin:/kubernetes.io/pods/openshift-kube-apiserver/kube-apiserver-master-0; range_end:; response_count:0; response_revision:9171; }","duration":"207.243248ms","start":"2026-03-20T08:38:58.039581Z","end":"2026-03-20T08:38:58.246824Z","steps":["trace[975991524] 'range keys from in-memory index tree' (duration: 207.083284ms)"],"step_count":1} 2026-03-20T08:38:58.246930190Z {"level":"info","ts":"2026-03-20T08:38:58.246881Z","caller":"traceutil/trace.go:171","msg":"trace[2642502] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:9171; }","duration":"187.186653ms","start":"2026-03-20T08:38:58.059685Z","end":"2026-03-20T08:38:58.246872Z","steps":["trace[2642502] 'range keys from in-memory index tree' (duration: 187.037499ms)"],"step_count":1} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715157203665023134 0ustar00000000000000002026-03-20T08:37:48.020620056Z Fixing etcd log permissions.Fixing etcd auto backup permissions.config/pod/openshift-oauth-apiserver/logs/apiserver-bc9b556d6-vdnq2/oauth-apiserver_current.log0000640000000000000000000011361015157203665031304 0ustar00000000000000002026-03-20T08:37:48.405068355Z W0320 08:37:48.404985 1 logging.go:55] [core] [Channel #14 SubChannel #18]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:37:48.827356599Z W0320 08:37:48.825803 1 logging.go:55] [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:37:48.960752752Z W0320 08:37:48.960618 1 logging.go:55] [core] [Channel #37 SubChannel #38]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:37:49.696794481Z W0320 08:37:49.696685 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:37:49.702528868Z W0320 08:37:49.702483 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:37:49.724278103Z W0320 08:37:49.724160 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:37:50.442555624Z W0320 08:37:50.442457 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:37:51.016368310Z W0320 08:37:51.016277 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:37:51.297437932Z W0320 08:37:51.297347 1 logging.go:55] [core] [Channel #22 SubChannel #23]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:37:51.297437932Z W0320 08:37:51.297347 1 logging.go:55] [core] [Channel #31 SubChannel #32]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:37:54.441363300Z W0320 08:37:54.441174 1 logging.go:55] [core] [Channel #37 SubChannel #38]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:37:58.127928235Z W0320 08:37:58.127839 1 logging.go:55] [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:37:59.201153695Z W0320 08:37:59.201052 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:37:59.553154897Z W0320 08:37:59.553045 1 logging.go:55] [core] [Channel #1 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:00.094931467Z W0320 08:38:00.094761 1 logging.go:55] [core] [Channel #31 SubChannel #32]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:00.315805663Z W0320 08:38:00.315672 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:00.509215547Z E0320 08:38:00.509121 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.512940716Z E0320 08:38:00.509602 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.512940716Z E0320 08:38:00.509726 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.512940716Z E0320 08:38:00.510012 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.512940716Z E0320 08:38:00.510256 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.524279526Z E0320 08:38:00.524173 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.525059399Z E0320 08:38:00.524857 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.530277441Z E0320 08:38:00.525292 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.530277441Z E0320 08:38:00.525351 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.530277441Z E0320 08:38:00.525351 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.579428326Z E0320 08:38:00.579327 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.586210504Z E0320 08:38:00.586127 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.586391779Z E0320 08:38:00.586280 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.591699034Z E0320 08:38:00.591614 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:00.977858303Z W0320 08:38:00.977690 1 logging.go:55] [core] [Channel #14 SubChannel #18]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:01.583690124Z W0320 08:38:01.583599 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:01.980215216Z E0320 08:38:01.980103 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:01.980338089Z E0320 08:38:01.980290 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:01.980447143Z E0320 08:38:01.980393 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:01.980447143Z E0320 08:38:01.980419 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:01.980566196Z E0320 08:38:01.980540 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:02.070456619Z W0320 08:38:02.070377 1 logging.go:55] [core] [Channel #22 SubChannel #23]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:02.112975400Z E0320 08:38:02.112882 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:02.113392652Z E0320 08:38:02.113359 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:02.113452244Z E0320 08:38:02.113407 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:02.113639920Z E0320 08:38:02.113606 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:02.113692441Z E0320 08:38:02.113653 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:02.240867713Z W0320 08:38:02.240788 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:03.199796727Z W0320 08:38:03.199718 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:12.509713995Z W0320 08:38:12.509580 1 logging.go:55] [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:14.485456231Z W0320 08:38:14.485344 1 logging.go:55] [core] [Channel #14 SubChannel #18]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:15.374146206Z W0320 08:38:15.374034 1 logging.go:55] [core] [Channel #31 SubChannel #32]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:15.620907667Z W0320 08:38:15.619965 1 logging.go:55] [core] [Channel #22 SubChannel #23]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:17.500234231Z W0320 08:38:17.500118 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:17.907387432Z W0320 08:38:17.907287 1 logging.go:55] [core] [Channel #1 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:19.108897566Z W0320 08:38:19.108778 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:19.331686317Z W0320 08:38:19.331584 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:19.787750297Z W0320 08:38:19.787635 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:20.875892352Z W0320 08:38:20.875803 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:38:30.499400002Z E0320 08:38:30.499223 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:30.499552457Z E0320 08:38:30.499504 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:30.499955538Z E0320 08:38:30.499921 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:30.500018310Z E0320 08:38:30.499971 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:30.500512165Z E0320 08:38:30.500479 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:30.515894563Z E0320 08:38:30.515774 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:30.516562823Z E0320 08:38:30.516519 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:30.517037217Z E0320 08:38:30.516997 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:30.517089668Z E0320 08:38:30.517051 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:30.517367337Z E0320 08:38:30.517322 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:31.993321379Z E0320 08:38:31.993265 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:31.997795650Z E0320 08:38:31.997774 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:32.000124978Z E0320 08:38:32.000073 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:32.001162478Z E0320 08:38:32.001118 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:32.123931651Z E0320 08:38:32.123861 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:32.124053174Z E0320 08:38:32.124007 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:32.124095766Z E0320 08:38:32.124063 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:32.124242940Z E0320 08:38:32.123873 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:32.124518768Z E0320 08:38:32.123941 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:33.007577827Z E0320 08:38:33.007270 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:38:37.127538219Z W0320 08:38:37.127417 1 logging.go:55] [core] [Channel #14 SubChannel #18]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-20T08:39:00.508460398Z E0320 08:39:00.508362 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.509839988Z E0320 08:39:00.508654 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.509839988Z E0320 08:39:00.508749 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.509839988Z E0320 08:39:00.508655 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.509839988Z E0320 08:39:00.509055 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.520965023Z E0320 08:39:00.520906 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.525308340Z E0320 08:39:00.521414 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.525308340Z E0320 08:39:00.521707 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.525308340Z E0320 08:39:00.521963 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.525308340Z E0320 08:39:00.522177 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.563961028Z E0320 08:39:00.563867 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.574671140Z E0320 08:39:00.574469 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.581894561Z E0320 08:39:00.581821 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:00.591340077Z E0320 08:39:00.590754 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:02.143849822Z E0320 08:39:02.143641 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:02.144445700Z E0320 08:39:02.144263 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:02.144641775Z E0320 08:39:02.144609 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:02.145427848Z E0320 08:39:02.144792 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:02.145427848Z E0320 08:39:02.144909 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:03.010973698Z E0320 08:39:03.010900 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:03.011013479Z E0320 08:39:03.010986 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:03.011155013Z E0320 08:39:03.010908 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:03.011375490Z E0320 08:39:03.011288 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" 2026-03-20T08:39:03.011375490Z E0320 08:39:03.011344 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2591284973680022944, SKID=9E:9F:97:C9:CC:77:F2:3C:4C:02:1B:92:1D:43:51:62:4A:D3:45:0C, AKID=55:24:B9:8E:B5:83:69:92:F5:23:D1:9B:1F:4A:0A:54:2F:7C:62:7E failed: x509: certificate signed by unknown authority]" config/pod/openshift-ingress/logs/router-default-7dcf5569b5-xmvwz/router_current.log0000640000000000000000000002240215157203665027235 0ustar00000000000000002026-03-20T08:38:32.978705355Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:32.978705355Z [-]has-synced failed: Router not synced 2026-03-20T08:38:33.978230804Z I0320 08:38:33.978134 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:33.978230804Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:33.978230804Z [-]has-synced failed: Router not synced 2026-03-20T08:38:35.014677601Z I0320 08:38:35.014595 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:35.014677601Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:35.014677601Z [-]has-synced failed: Router not synced 2026-03-20T08:38:35.977853098Z I0320 08:38:35.977735 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:35.977853098Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:35.977853098Z [-]has-synced failed: Router not synced 2026-03-20T08:38:36.976919444Z I0320 08:38:36.976856 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:36.976919444Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:36.976919444Z [-]has-synced failed: Router not synced 2026-03-20T08:38:37.978650397Z I0320 08:38:37.978560 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:37.978650397Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:37.978650397Z [-]has-synced failed: Router not synced 2026-03-20T08:38:38.977559719Z I0320 08:38:38.977475 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:38.977559719Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:38.977559719Z [-]has-synced failed: Router not synced 2026-03-20T08:38:39.976972243Z I0320 08:38:39.976840 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:39.976972243Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:39.976972243Z [-]has-synced failed: Router not synced 2026-03-20T08:38:40.977934174Z I0320 08:38:40.977815 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:40.977934174Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:40.977934174Z [-]has-synced failed: Router not synced 2026-03-20T08:38:41.977856535Z I0320 08:38:41.977786 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:41.977856535Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:41.977856535Z [-]has-synced failed: Router not synced 2026-03-20T08:38:42.978112294Z I0320 08:38:42.978045 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:42.978112294Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:42.978112294Z [-]has-synced failed: Router not synced 2026-03-20T08:38:43.977854810Z I0320 08:38:43.977750 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:43.977854810Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:43.977854810Z [-]has-synced failed: Router not synced 2026-03-20T08:38:44.976809572Z I0320 08:38:44.976726 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:44.976809572Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:44.976809572Z [-]has-synced failed: Router not synced 2026-03-20T08:38:45.979015569Z I0320 08:38:45.978925 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:45.979015569Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:45.979015569Z [-]has-synced failed: Router not synced 2026-03-20T08:38:46.977104116Z I0320 08:38:46.977057 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:46.977104116Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:46.977104116Z [-]has-synced failed: Router not synced 2026-03-20T08:38:47.977723487Z I0320 08:38:47.977671 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:47.977723487Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:47.977723487Z [-]has-synced failed: Router not synced 2026-03-20T08:38:48.977027069Z I0320 08:38:48.976964 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:48.977027069Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:48.977027069Z [-]has-synced failed: Router not synced 2026-03-20T08:38:49.978852726Z I0320 08:38:49.978791 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:49.978852726Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:49.978852726Z [-]has-synced failed: Router not synced 2026-03-20T08:38:50.982316408Z I0320 08:38:50.982249 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:50.982316408Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:50.982316408Z [-]has-synced failed: Router not synced 2026-03-20T08:38:51.982654632Z I0320 08:38:51.982586 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:51.982654632Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:51.982654632Z [-]has-synced failed: Router not synced 2026-03-20T08:38:52.977213826Z I0320 08:38:52.977113 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:52.977213826Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:52.977213826Z [-]has-synced failed: Router not synced 2026-03-20T08:38:53.977294660Z I0320 08:38:53.977230 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:53.977294660Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:53.977294660Z [-]has-synced failed: Router not synced 2026-03-20T08:38:55.009111902Z I0320 08:38:54.977947 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:55.009111902Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:55.009111902Z [-]has-synced failed: Router not synced 2026-03-20T08:38:55.978051688Z I0320 08:38:55.977961 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:55.978051688Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:55.978051688Z [-]has-synced failed: Router not synced 2026-03-20T08:38:56.977721911Z I0320 08:38:56.977667 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:56.977721911Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:56.977721911Z [-]has-synced failed: Router not synced 2026-03-20T08:38:57.977458046Z I0320 08:38:57.977376 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:57.977458046Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:57.977458046Z [-]has-synced failed: Router not synced 2026-03-20T08:38:58.752230266Z W0320 08:38:58.751729 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-20T08:38:58.752230266Z E0320 08:38:58.751778 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-20T08:38:58.978410206Z I0320 08:38:58.978330 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:58.978410206Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:58.978410206Z [-]has-synced failed: Router not synced 2026-03-20T08:38:59.979089839Z I0320 08:38:59.978963 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:38:59.979089839Z [-]backend-http failed: backend reported failure 2026-03-20T08:38:59.979089839Z [-]has-synced failed: Router not synced 2026-03-20T08:39:00.978266077Z I0320 08:39:00.977613 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:39:00.978266077Z [-]backend-http failed: backend reported failure 2026-03-20T08:39:00.978266077Z [-]has-synced failed: Router not synced 2026-03-20T08:39:01.978469386Z I0320 08:39:01.978364 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:39:01.978469386Z [-]backend-http failed: backend reported failure 2026-03-20T08:39:01.978469386Z [-]has-synced failed: Router not synced 2026-03-20T08:39:02.976868083Z I0320 08:39:02.976767 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:39:02.976868083Z [-]backend-http failed: backend reported failure 2026-03-20T08:39:02.976868083Z [-]has-synced failed: Router not synced 2026-03-20T08:39:03.978418771Z I0320 08:39:03.978329 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:39:03.978418771Z [-]backend-http failed: backend reported failure 2026-03-20T08:39:03.978418771Z [-]has-synced failed: Router not synced 2026-03-20T08:39:04.978356131Z I0320 08:39:04.978264 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-20T08:39:04.978356131Z [-]backend-http failed: backend reported failure 2026-03-20T08:39:04.978356131Z [-]has-synced failed: Router not synced authentication-operator_current.log0000640000000000000000000005655215157203665037432 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5885bfd7f4-62zrx2026-03-20T08:38:55.767112162Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: 401 2026-03-20T08:38:55.767112162Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/user.openshift.io/v1: 401 2026-03-20T08:38:55.767112162Z > 2026-03-20T08:38:55.861362413Z I0320 08:38:55.861288 1 request.go:700] Waited for 2.298313391s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication/endpoints?limit=500&resourceVersion=0 2026-03-20T08:38:55.863330740Z I0320 08:38:55.863272 1 reflector.go:368] Caches populated for *v1.Endpoints from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:56.069251660Z I0320 08:38:56.068633 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:56.158524135Z I0320 08:38:56.158475 1 base_controller.go:82] Caches are synced for OAuthServerServiceEndpointsEndpointAccessibleController 2026-03-20T08:38:56.158579006Z I0320 08:38:56.158568 1 base_controller.go:119] Starting #1 worker of OAuthServerServiceEndpointsEndpointAccessibleController controller ... 2026-03-20T08:38:56.161610185Z E0320 08:38:56.161309 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-20T08:38:56.170799333Z E0320 08:38:56.170745 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-20T08:38:56.186771849Z E0320 08:38:56.186706 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-20T08:38:56.210531893Z E0320 08:38:56.210466 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-20T08:38:56.254406123Z E0320 08:38:56.254320 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-20T08:38:56.275481958Z I0320 08:38:56.275408 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:56.327938979Z I0320 08:38:56.327850 1 base_controller.go:82] Caches are synced for ConfigObserver 2026-03-20T08:38:56.327938979Z I0320 08:38:56.327893 1 base_controller.go:119] Starting #1 worker of ConfigObserver controller ... 2026-03-20T08:38:56.327993120Z I0320 08:38:56.327935 1 base_controller.go:82] Caches are synced for RouterCertsDomainValidationController 2026-03-20T08:38:56.327993120Z I0320 08:38:56.327971 1 base_controller.go:119] Starting #1 worker of RouterCertsDomainValidationController controller ... 2026-03-20T08:38:56.339763084Z E0320 08:38:56.339691 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-20T08:38:56.357617825Z I0320 08:38:56.357570 1 base_controller.go:82] Caches are synced for TrustDistributionController 2026-03-20T08:38:56.357617825Z I0320 08:38:56.357607 1 base_controller.go:119] Starting #1 worker of TrustDistributionController controller ... 2026-03-20T08:38:56.417672648Z E0320 08:38:56.417569 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-20T08:38:56.417672648Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: 401 2026-03-20T08:38:56.417672648Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/user.openshift.io/v1: 401 2026-03-20T08:38:56.417672648Z > 2026-03-20T08:38:56.448462926Z W0320 08:38:56.448374 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-03-20T08:38:56.448462926Z E0320 08:38:56.448431 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-03-20T08:38:56.465178954Z I0320 08:38:56.464760 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:56.505354376Z E0320 08:38:56.505276 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-20T08:38:56.598612198Z W0320 08:38:56.598502 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-20T08:38:56.598612198Z E0320 08:38:56.598585 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-03-20T08:38:56.664620904Z I0320 08:38:56.664528 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:56.829233048Z E0320 08:38:56.829154 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-20T08:38:56.861976534Z I0320 08:38:56.861882 1 request.go:700] Waited for 3.298559911s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication/services?limit=500&resourceVersion=0 2026-03-20T08:38:56.863489758Z I0320 08:38:56.863441 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:56.928024561Z I0320 08:38:56.927901 1 base_controller.go:82] Caches are synced for OAuthServerServiceEndpointAccessibleController 2026-03-20T08:38:56.928024561Z I0320 08:38:56.927947 1 base_controller.go:119] Starting #1 worker of OAuthServerServiceEndpointAccessibleController controller ... 2026-03-20T08:38:56.928083983Z I0320 08:38:56.928037 1 base_controller.go:82] Caches are synced for openshift-authentication-ServiceCA 2026-03-20T08:38:56.928083983Z I0320 08:38:56.928061 1 base_controller.go:119] Starting #1 worker of openshift-authentication-ServiceCA controller ... 2026-03-20T08:38:56.934236932Z E0320 08:38:56.934105 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused" 2026-03-20T08:38:56.945694147Z E0320 08:38:56.945616 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused" 2026-03-20T08:38:56.963037603Z E0320 08:38:56.962963 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused" 2026-03-20T08:38:56.963265960Z I0320 08:38:56.963233 1 base_controller.go:82] Caches are synced for OpenshiftAuthenticationStaticResources-StaticResources 2026-03-20T08:38:56.963265960Z I0320 08:38:56.963260 1 base_controller.go:119] Starting #1 worker of OpenshiftAuthenticationStaticResources-StaticResources controller ... 2026-03-20T08:38:56.998955111Z E0320 08:38:56.991160 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused" 2026-03-20T08:38:57.038235507Z E0320 08:38:57.038124 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused" 2026-03-20T08:38:57.063529856Z I0320 08:38:57.063437 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:57.125330459Z E0320 08:38:57.125252 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused" 2026-03-20T08:38:57.158089245Z I0320 08:38:57.157931 1 base_controller.go:82] Caches are synced for openshift-authentication-IngressState 2026-03-20T08:38:57.158089245Z I0320 08:38:57.157972 1 base_controller.go:119] Starting #1 worker of openshift-authentication-IngressState controller ... 2026-03-20T08:38:57.263760118Z I0320 08:38:57.263662 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:57.291729064Z E0320 08:38:57.291662 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused" 2026-03-20T08:38:57.358558244Z I0320 08:38:57.358475 1 base_controller.go:82] Caches are synced for WebhookAuthenticatorController 2026-03-20T08:38:57.358558244Z I0320 08:38:57.358516 1 base_controller.go:119] Starting #1 worker of WebhookAuthenticatorController controller ... 2026-03-20T08:38:57.469849372Z I0320 08:38:57.469781 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:57.472138949Z E0320 08:38:57.472103 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-20T08:38:57.617631335Z E0320 08:38:57.617564 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused" 2026-03-20T08:38:57.663273397Z I0320 08:38:57.663180 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:57.862525922Z I0320 08:38:57.862425 1 request.go:700] Waited for 4.291202778s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/secrets?limit=500&resourceVersion=0 2026-03-20T08:38:57.866086586Z I0320 08:38:57.866036 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:57.900074937Z E0320 08:38:57.900009 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-20T08:38:57.900074937Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: 401 2026-03-20T08:38:57.900074937Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/user.openshift.io/v1: 401 2026-03-20T08:38:57.900074937Z > 2026-03-20T08:38:57.930340921Z I0320 08:38:57.930245 1 base_controller.go:82] Caches are synced for oauth-server 2026-03-20T08:38:57.930340921Z I0320 08:38:57.930288 1 base_controller.go:119] Starting #1 worker of oauth-server controller ... 2026-03-20T08:38:58.063407684Z I0320 08:38:58.063328 1 reflector.go:368] Caches populated for *v1.Endpoints from k8s.io/client-go/informers/factory.go:160 2026-03-20T08:38:58.158348485Z I0320 08:38:58.158245 1 base_controller.go:82] Caches are synced for ConfigObserver 2026-03-20T08:38:58.158348485Z I0320 08:38:58.158283 1 base_controller.go:119] Starting #1 worker of ConfigObserver controller ... 2026-03-20T08:38:58.263686859Z E0320 08:38:58.263600 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused" 2026-03-20T08:38:58.757956263Z E0320 08:38:58.757857 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-20T08:38:58.864596645Z I0320 08:38:58.864348 1 request.go:700] Waited for 5.107878072s due to client-side throttling, not priority and fairness, request: POST:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication-operator/events 2026-03-20T08:38:59.550061059Z E0320 08:38:59.549963 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused" 2026-03-20T08:39:00.061809463Z I0320 08:39:00.061692 1 request.go:700] Waited for 3.703732695s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert 2026-03-20T08:39:00.465080192Z W0320 08:39:00.464954 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-03-20T08:39:00.465080192Z E0320 08:39:00.465048 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-03-20T08:39:00.473042194Z E0320 08:39:00.472959 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-20T08:39:00.473042194Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: 401 2026-03-20T08:39:00.473042194Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/user.openshift.io/v1: 401 2026-03-20T08:39:00.473042194Z > 2026-03-20T08:39:01.062599298Z I0320 08:39:01.062290 1 request.go:700] Waited for 2.592084373s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api 2026-03-20T08:39:01.168277022Z W0320 08:39:01.168147 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-20T08:39:01.168349795Z E0320 08:39:01.168311 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-03-20T08:39:01.321622387Z E0320 08:39:01.321441 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-20T08:39:02.062542650Z I0320 08:39:02.062390 1 request.go:700] Waited for 1.198338111s due to client-side throttling, not priority and fairness, request: POST:https://172.30.0.1:443/api/v1/namespaces/openshift-config/secrets 2026-03-20T08:39:02.072640414Z I0320 08:39:02.072527 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/webhook-authentication-integrated-oauth -n openshift-config because it was missing 2026-03-20T08:39:02.094010658Z W0320 08:39:02.093384 1 warnings.go:70] unknown field "status.oidcClients" 2026-03-20T08:39:02.100539518Z W0320 08:39:02.097595 1 dynamic_operator_client.go:355] .status.conditions["WebhookAuthenticatorControllerDegraded"].message is missing; this will eventually be fatal 2026-03-20T08:39:02.125748504Z E0320 08:39:02.125655 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused" 2026-03-20T08:39:02.156269515Z I0320 08:39:02.156151 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-20T08:38:53Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-03-20T08:37:11Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-03-20T08:36:20Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-20T08:36:20Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-20T08:39:02.157979115Z E0320 08:39:02.157913 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-20T08:39:02.165840424Z E0320 08:39:02.165760 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused" 2026-03-20T08:39:02.170968004Z I0320 08:39:02.170841 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory" to "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready" 2026-03-20T08:39:03.261772097Z I0320 08:39:03.261638 1 request.go:700] Waited for 1.168408857s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication/configmaps/v4-0-config-system-service-ca 2026-03-20T08:39:04.262286295Z I0320 08:39:04.262095 1 request.go:700] Waited for 1.985201904s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver 2026-03-20T08:39:04.571540119Z E0320 08:39:04.571404 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-20T08:39:04.571540119Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: 401 2026-03-20T08:39:04.571540119Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/user.openshift.io/v1: 401 2026-03-20T08:39:04.571540119Z > 2026-03-20T08:39:05.462281453Z I0320 08:39:05.462164 1 request.go:700] Waited for 1.193178089s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api authentication-operator_previous.log0000640000000000000000000000421315157203665037607 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5885bfd7f4-62zrx2026-03-20T08:37:38.587316507Z Copying system trust bundle 2026-03-20T08:37:38.672234805Z W0320 08:37:38.672103 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-03-20T08:37:38.672501173Z I0320 08:37:38.672450 1 observer_polling.go:159] Starting file observer 2026-03-20T08:37:38.672840573Z I0320 08:37:38.672814 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-20T08:37:38.672881074Z I0320 08:37:38.672848 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-20T08:37:38.673357958Z I0320 08:37:38.673268 1 observer_polling.go:159] Starting file observer 2026-03-20T08:38:38.683248780Z W0320 08:38:38.683041 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods authentication-operator-5885bfd7f4-62zrx) 2026-03-20T08:38:38.683248780Z I0320 08:38:38.683213 1 builder.go:304] cluster-authentication-operator version - 2026-03-20T08:38:38.684963970Z I0320 08:38:38.684054 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-20T08:38:46.580589894Z I0320 08:38:46.580066 1 cmd.go:141] Received SIGTERM or SIGINT signal, shutting down controller. 2026-03-20T08:38:48.673029658Z I0320 08:38:48.672946 1 observer_polling.go:162] Shutting down file observer 2026-03-20T08:38:48.674109749Z I0320 08:38:48.674083 1 observer_polling.go:162] Shutting down file observer 2026-03-20T08:38:50.769954836Z I0320 08:38:50.768645 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-20T08:38:50.769954836Z F0320 08:38:50.768766 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context canceled config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-62zrx.json0000640000000000000000000002147315157203665030315 0ustar0000000000000000{"metadata":{"name":"authentication-operator-5885bfd7f4-62zrx","generateName":"authentication-operator-5885bfd7f4-","namespace":"openshift-authentication-operator","uid":"29b5b089-fb1d-46a1-bd67-2e0ba03c76a6","resourceVersion":"9113","creationTimestamp":"2026-03-20T08:34:23Z","labels":{"app":"authentication-operator","pod-template-hash":"5885bfd7f4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.25/23\"],\"mac_address\":\"0a:58:0a:80:00:19\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.25/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.25\"\n ],\n \"mac\": \"0a:58:0a:80:00:19\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-5885bfd7f4","uid":"0205395a-740b-4b35-b14d-5dc7e373b045","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-s69rd","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3fdcbf7be3f90bd080ffb2c75b091d7eef03681e0f90912ff6140ee48c177616"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.35_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-s69rd","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c5"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:15Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:06Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:37:38Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:37:38Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.25","podIPs":[{"ip":"10.128.0.25"}],"startTime":"2026-03-20T08:36:06Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-03-20T08:38:51Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"Copying system trust bundle\nW0320 08:37:38.672103 1 cmd.go:167] Unable to read initial content of \"/tmp/terminate\": open /tmp/terminate: no such file or directory\nI0320 08:37:38.672450 1 observer_polling.go:159] Starting file observer\nI0320 08:37:38.672814 1 cmd.go:253] Using service-serving-cert provided certificates\nI0320 08:37:38.672848 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0320 08:37:38.673268 1 observer_polling.go:159] Starting file observer\nW0320 08:38:38.683041 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods authentication-operator-5885bfd7f4-62zrx)\nI0320 08:38:38.683213 1 builder.go:304] cluster-authentication-operator version -\nI0320 08:38:38.684054 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nI0320 08:38:46.580066 1 cmd.go:141] Received SIGTERM or SIGINT signal, shutting down controller.\nI0320 08:38:48.672946 1 observer_polling.go:162] Shutting down file observer\nI0320 08:38:48.674083 1 observer_polling.go:162] Shutting down file observer\nI0320 08:38:50.768645 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController\nF0320 08:38:50.768766 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context canceled\n","startedAt":"2026-03-20T08:37:38Z","finishedAt":"2026-03-20T08:38:50Z","containerID":"cri-o://8009103455f6e5b4ff5637d33a8290182816ff88ad007a0262e9e5800739bab4"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","containerID":"cri-o://df7ec56bc0dc6a5103a746a24bbb9fc1482c902df08dcd67e4b6e70f5d055d5f","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-s69rd","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000003423715157203665020657 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:30:38Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:30:48Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-7b95f86987 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:30:50Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-5c9796789 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:30:51Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-68f85b4d6c to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:30:53Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-68f85b4d6c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:30:53Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5c9796789-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:30:53Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-7b95f86987-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:34:20Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:34:21Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-7b95f86987-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:34:21Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5c9796789-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:34:23Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:34:23Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-68f85b4d6c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:34:23Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-5c9796789-tjm9l","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:34:23Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:34:23Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-7b95f86987-2pg77","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:34:25Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-68f85b4d6c-fzm28","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:34:25Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:06Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-fzm28 to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:06Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-2pg77 to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:06Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/olm-operator-5c9796789-tjm9l to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:10Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:10Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:10Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:31Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:31Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:31Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:47Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.11/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:48Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.7/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:48Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.22/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:48Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:48Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:48Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:49Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:36:49Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 14.137s (14.137s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 14.887s (14.887s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 14.102s (14.102s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:04Z","reason":"LeaderElection","message":"package-server-manager-7b95f86987-2pg77_48be34a1-8287-4af5-a0e6-3e5bb9d5e838 became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:05Z","reason":"RequirementsUnknown","message":"requirements not yet checked","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:06Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:07Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-6c85f64bb9-fmpsg","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:07Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/packageserver-6c85f64bb9-fmpsg to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:07Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-6c85f64bb9 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:07Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:07Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:08Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:08Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.55/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:09Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:09Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:10Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.55:5443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:10Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.55:5443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:11Z","reason":"ProbeError","message":"Readiness probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[-]poststarthook/generic-apiserver-start-informers failed: reason withheld\n[-]poststarthook/max-in-flight-filter failed: reason withheld\n[-]poststarthook/storage-object-count-tracker-hook failed: reason withheld\nhealthz check failed\n\n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-20T08:37:11Z","reason":"Unhealthy","message":"Readiness probe failed: HTTP probe failed with statuscode: 500","type":"Warning"}]}events/openshift-route-controller-manager.json0000640000000000000000000002465315157203665020407 0ustar0000000000000000{"items":[{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:21Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-6cd6978d68 to 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:21Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-6cd6978d68-4chhh","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:21Z","reason":"Scheduled","message":"Successfully assigned openshift-route-controller-manager/route-controller-manager-6cd6978d68-4chhh to master-0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : configmap \"config\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:23Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-6cd6978d68 to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:23Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-5ff6bdb8cf to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:23Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-6cd6978d68-4chhh","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:23Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-5ff6bdb8cf-b6499","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:24Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:26Z","reason":"Scheduled","message":"Successfully assigned openshift-route-controller-manager/route-controller-manager-5ff6bdb8cf-b6499 to master-0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:34Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:34Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:41Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-74cf48bcc6 to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:41Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-5ff6bdb8cf-b6499","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:41Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-74cf48bcc6-kwngm","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:41Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-5ff6bdb8cf to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:42Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : object \"openshift-route-controller-manager\"/\"client-ca\" not registered","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:42Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-route-controller-manager\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:42Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:45Z","reason":"Scheduled","message":"Successfully assigned openshift-route-controller-manager/route-controller-manager-74cf48bcc6-kwngm to master-0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:36:53Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:00Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-74cf48bcc6-kwngm","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:00Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-7ffc895647-6j97v","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:00Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-74cf48bcc6 to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:00Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-7ffc895647 to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:02Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:05Z","reason":"Scheduled","message":"Successfully assigned openshift-route-controller-manager/route-controller-manager-7ffc895647-6j97v to master-0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:06Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.51/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:06Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b\"","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:19Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b\" in 13.127s (13.127s including waiting). Image size: 487096305 bytes.","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:20Z","reason":"LeaderElection","message":"route-controller-manager-7ffc895647-6j97v_0ca6b232-7717-4cf9-bac0-64ff04f0ff1a became leader","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:20Z","reason":"Created","message":"Created container: route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:20Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-7ffc895647-6j97v","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:20Z","reason":"Started","message":"Started container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:20Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-56f686584b-fdcx5","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:20Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:20Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-7ffc895647 to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:20Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-56f686584b to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:22Z","reason":"Killing","message":"Stopping container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:25Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:25Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:36Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.51:8443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-20T08:37:36Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.51:8443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"}]}events/openshift-controller-manager.json0000640000000000000000000002074415157203665017250 0ustar0000000000000000{"items":[{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:20Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-797c5b47d8 to 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:21Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-797c5b47d8-xrgq6 to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:21Z","reason":"FailedCreate","message":"Error creating: pods \"controller-manager-797c5b47d8-\" is forbidden: error looking up service account openshift-controller-manager/openshift-controller-manager-sa: serviceaccount \"openshift-controller-manager-sa\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:21Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-797c5b47d8-xrgq6","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:23Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-797c5b47d8-xrgq6","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:23Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:23Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-f9d74d9cf-ks2l5","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:23Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-797c5b47d8 to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:23Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-f9d74d9cf to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : configmap \"config\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:24Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-f9d74d9cf-ks2l5 to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:40Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:41Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-f9d74d9cf-ks2l5","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:41Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:41Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-5dcd9ffc84 to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:41Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-f9d74d9cf to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:41Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-5dcd9ffc84-qh6pq","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:42Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-5dcd9ffc84-qh6pq to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:36:58Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:37:00Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-5dcd9ffc84-qh6pq","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:37:00Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-6486d766f9-5b77h","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:37:00Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-6486d766f9 to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:37:00Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-5dcd9ffc84 to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:37:02Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:37:05Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-6486d766f9-5b77h to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:37:06Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982\"","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:37:06Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.52/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:37:20Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-fc56bb77c-qd4sn","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:37:20Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:37:20Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-6486d766f9-5b77h","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:37:20Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-6486d766f9 to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:37:20Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-fc56bb77c to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:37:28Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982\" in 22.556s (22.556s including waiting). Image size: 558211175 bytes.","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:37:38Z","reason":"Created","message":"Created container: controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:37:38Z","reason":"Started","message":"Started container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-20T08:37:38Z","reason":"Killing","message":"Stopping container controller-manager","type":"Normal"}]}events/openshift-controller-manager-operator.json0000640000000000000000000007705515157203665021110 0ustar0000000000000000{"items":[{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:30:37Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-controller-manager-operator-8c94f4649 to 1","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:30:47Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-controller-manager-operator-8c94f4649-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:34:21Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-controller-manager-operator-8c94f4649-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:34:24Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:34:24Z","reason":"SuccessfulCreate","message":"Created pod: openshift-controller-manager-operator-8c94f4649-p7pt6","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:06Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-p7pt6 to master-0","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:08Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.23/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:08Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:16Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:18Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71\" in 2.694s (2.694s including waiting). Image size: 507972093 bytes.","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"LeaderElection","message":"openshift-controller-manager-operator-8c94f4649-p7pt6_bc43d1d2-5cbb-4b6d-8675-0d97f3f10354 became leader","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to BuildCSIVolumes=true","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"build\": map[string]any{\n+ \t\t\"buildDefaults\": map[string]any{\"resources\": map[string]any{}},\n+ \t\t\"imageTemplateFormat\": map[string]any{\n+ \t\t\t\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e7030c5cce\"...),\n+ \t\t},\n+ \t},\n+ \t\"controllers\": []any{\n+ \t\tstring(\"openshift.io/build\"), string(\"openshift.io/build-config-change\"),\n+ \t\tstring(\"openshift.io/builder-rolebindings\"),\n+ \t\tstring(\"openshift.io/builder-serviceaccount\"),\n+ \t\tstring(\"-openshift.io/default-rolebindings\"), string(\"openshift.io/deployer\"),\n+ \t\tstring(\"openshift.io/deployer-rolebindings\"),\n+ \t\tstring(\"openshift.io/deployer-serviceaccount\"),\n+ \t\tstring(\"openshift.io/deploymentconfig\"), string(\"openshift.io/image-import\"),\n+ \t\tstring(\"openshift.io/image-puller-rolebindings\"),\n+ \t\tstring(\"openshift.io/image-signature-import\"),\n+ \t\tstring(\"openshift.io/image-trigger\"), string(\"openshift.io/ingress-ip\"),\n+ \t\tstring(\"openshift.io/ingress-to-route\"),\n+ \t\tstring(\"openshift.io/origin-namespace\"), ...,\n+ \t},\n+ \t\"deployer\": map[string]any{\n+ \t\t\"imageTemplateFormat\": map[string]any{\n+ \t\t\t\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6e5004457a\"...),\n+ \t\t},\n+ \t},\n+ \t\"featureGates\": []any{string(\"BuildCSIVolumes=true\")},\n+ \t\"ingress\": map[string]any{\"ingressIPNetworkCIDR\": string(\"\")},\n }\n","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftcontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"openshift-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-route-controller-manager\"}]","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/config -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"RoleCreateFailed","message":"Failed to create Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"ConfigMapCreateFailed","message":"Failed to create configmap/openshift-service-ca-n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"RoleBindingCreateFailed","message":"Failed to create RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/openshift-global-ca -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/config -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"RoleCreateFailed","message":"Failed to create Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"DeploymentCreated","message":"Created Deployment.apps/controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"RoleBindingCreateFailed","message":"Failed to create RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/route-controller-manager-sa -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-creating-route-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-creating-route-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/prometheus-k8s -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"ServiceCreated","message":"Created Service/route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:ingress-to-route-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:ingress-to-route-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-creating-openshift-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-creating-openshift-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-controller-manager-sa -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"ServiceCreated","message":"Created Service/controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/prometheus-k8s -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:update-buildconfig-status because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:update-buildconfig-status because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:deployer because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:deployer because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:image-trigger-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:image-trigger-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"DeploymentCreated","message":"Created Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"ConfigMapCreated","message":"Created configmap/openshift-service-ca-n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded message changed from \"All is well\" to \"OpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-role.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded message changed from \"OpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-role.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \" to \"All is well\",Progressing changed from Unknown to True (\"Progressing: deployment/controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 0, desired generation is 2.\"),Available changed from Unknown to False (\"Available: no pods available on any node.\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 0, desired generation is 2.\" to \"Progressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:40Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.openshift-controller-manager.serving-cert.secret","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:40Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-route-controller-manager:\ncause by changes in data.openshift-route-controller-manager.serving-cert.secret","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\" to \"Progressing: deployment/controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\" to \"Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:20Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:20Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/controller-manager -n openshift-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:20Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.openshift-controller-manager.client-ca.configmap","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:20Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-route-controller-manager:\ncause by changes in data.openshift-route-controller-manager.client-ca.configmap","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\" to \"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 4, desired generation is 5.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:40Z","reason":"Created","message":"Created container: openshift-controller-manager-operator","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:40Z","reason":"Started","message":"Started container openshift-controller-manager-operator","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:40Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71\" already present on machine","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001122415157203665015446 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:35Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-c765cd67b to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:36Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-c765cd67b-xddmb to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:36Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-c765cd67b-xddmb","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:38Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : secret \"etcd-client\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:38Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:40Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-c765cd67b to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-779f85678d to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:40Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-c765cd67b-xddmb","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:40Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:40Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-779f85678d-lrzfz","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:42Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:45Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-779f85678d-lrzfz to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:46Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.43/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:51Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:51Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:51Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\" in 4.947s (4.947s including waiting). Image size: 589386806 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:52Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:52Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:52Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:36:53Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:37:02Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-20T08:37:02Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"}]}events/openshift-apiserver-operator.json0000640000000000000000000010252415157203665017303 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:30:37Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-d65958b8 to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:30:47Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-d65958b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:34:21Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-d65958b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:34:23Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:34:23Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-d65958b8-th2vj","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:06Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-th2vj to master-0","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:08Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.8/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:08Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:08Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\": pull QPS exceeded","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:08Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:09Z","reason":"BackOff","message":"Back-off pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:09Z","reason":"Failed","message":"Error: ImagePullBackOff","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:16Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\" in 4.024s (4.024s including waiting). Image size: 512274055 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"LeaderElection","message":"openshift-apiserver-operator-d65958b8-th2vj_fba48b0d-bec6-403d-8e66-13a019ff654c became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n  }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"audit\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:26Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:26Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:26Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:29Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:30Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:35Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:39Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:40Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:36:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:07Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:07Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:07Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:07Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:07Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:07Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:08Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:08Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:09Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:09Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.35\"}] to [{\"operator\" \"4.18.35\"} {\"openshift-apiserver\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:09Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:09Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:09Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:09Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:09Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:09Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:09Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:09Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:09Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:37:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:38:46Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:38:46Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-20T08:38:46Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\" already present on machine","type":"Normal"}]}events/openshift-machine-config-operator.json0000640000000000000000000007737415157203665020170 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:30:53Z","reason":"ScalingReplicaSet","message":"Scaled up replica set machine-config-operator-84d549f6d5 to 1","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:30:53Z","reason":"FailedCreate","message":"Error creating: pods \"machine-config-operator-84d549f6d5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:34:22Z","reason":"BackOff","message":"Back-off restarting failed container kube-rbac-proxy-crio in pod kube-rbac-proxy-crio-master-0_openshift-machine-config-operator(1249822f86f23526277d165c0d5d3c19)","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:34:23Z","reason":"FailedCreate","message":"Error creating: pods \"machine-config-operator-84d549f6d5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:34:25Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:34:25Z","reason":"SuccessfulCreate","message":"Created pod: machine-config-operator-84d549f6d5-gm4qr","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:34:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:34:37Z","reason":"Created","message":"Created container: kube-rbac-proxy-crio","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:34:37Z","reason":"Started","message":"Started container kube-rbac-proxy-crio","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:06Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-config-operator/machine-config-operator-84d549f6d5-gm4qr to master-0","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:10Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : secret \"mco-proxy-tls\" not found","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:31Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : secret \"mco-proxy-tls\" not found","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:48Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.19/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/mcd-prometheus-k8s -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-daemon-events because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-daemon because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"SecretCreated","message":"Created Secret/master-user-data-managed -n openshift-machine-api because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"Started","message":"Started container machine-config-operator","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"OperatorVersionChanged","message":"clusteroperator/machine-config started a version change from [] to [{operator 4.18.35} {operator-image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015}]","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"Created","message":"Created container: machine-config-operator","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:52Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/mcd-prometheus-k8s -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:52Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-daemon-events -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:52Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-daemon-events -n default because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:52Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/machine-config-daemon -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:53Z","reason":"ValidatingAdmissionPolicyCreated","message":"Created ValidatingAdmissionPolicy.admissionregistration.k8s.io/mcn-guards because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:53Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-daemon -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:53Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-rbac-proxy -n openshift-machine-config-operator:\ncause by changes in data.config-file.yaml","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:53Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-config-daemon because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:53Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-config-daemon -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:54Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-config-operator/machine-config-daemon-9t8x6 to master-0","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:54Z","reason":"ValidatingAdmissionPolicyBindingCreated","message":"Created ValidatingAdmissionPolicyBinding.admissionregistration.k8s.io/mcn-guards-binding because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:36:54Z","reason":"SuccessfulCreate","message":"Created pod: machine-config-daemon-9t8x6","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:02Z","reason":"Started","message":"Started container machine-config-daemon","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:02Z","reason":"Created","message":"Created container: machine-config-daemon","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:03Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-controller-events -n default because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:03Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-controller-events -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:03Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:03Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/mcc-prometheus-k8s -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:03Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-controller because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:03Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-controller-events because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:03Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/mcc-prometheus-k8s -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:04Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-os-puller -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:04Z","reason":"ValidatingAdmissionPolicyCreated","message":"Created ValidatingAdmissionPolicy.admissionregistration.k8s.io/managed-bootimages-platform-check because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:04Z","reason":"ValidatingAdmissionPolicyBindingCreated","message":"Created ValidatingAdmissionPolicyBinding.admissionregistration.k8s.io/machine-configuration-guards-binding because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:04Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-os-puller-binding -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:04Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-config-controller because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:04Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-config-controller -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:04Z","reason":"ValidatingAdmissionPolicyCreated","message":"Created ValidatingAdmissionPolicy.admissionregistration.k8s.io/custom-machine-config-pool-selector because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:04Z","reason":"ValidatingAdmissionPolicyCreated","message":"Created ValidatingAdmissionPolicy.admissionregistration.k8s.io/machine-configuration-guards because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:05Z","reason":"ValidatingAdmissionPolicyBindingCreated","message":"Created ValidatingAdmissionPolicyBinding.admissionregistration.k8s.io/managed-bootimages-platform-check-binding because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:05Z","reason":"SuccessfulCreate","message":"Created pod: machine-config-controller-b4f87c5b9-pj7rj","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:05Z","reason":"ScalingReplicaSet","message":"Scaled up replica set machine-config-controller-b4f87c5b9 to 1","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:05Z","reason":"ValidatingAdmissionPolicyBindingCreated","message":"Created ValidatingAdmissionPolicyBinding.admissionregistration.k8s.io/custom-machine-config-pool-selector-binding because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:05Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-config-operator/machine-config-controller-b4f87c5b9-pj7rj to master-0","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:06Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.53/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:07Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:07Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:07Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:07Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:07Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:07Z","reason":"Started","message":"Started container machine-config-controller","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:07Z","reason":"Created","message":"Created container: machine-config-controller","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:12Z","reason":"RenderedConfigGenerated","message":"rendered-worker-6c41cf327075224fbef5e7f434bc5d69 successfully generated (release version: 4.18.35, controller version: 393b8dc2c216dbbbf68cd1ccde5cbc2b551b2fe8)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:12Z","reason":"RenderedConfigGenerated","message":"rendered-master-47246abc0cee5fbe972e47e23f330f37 successfully generated (release version: 4.18.35, controller version: 393b8dc2c216dbbbf68cd1ccde5cbc2b551b2fe8)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:14Z","reason":"SecretCreated","message":"Created Secret/node-bootstrapper-token -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:14Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/node-bootstrapper -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:14Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-config-operator/machine-config-server-gj4pm to master-0","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:14Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-server because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:14Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system-bootstrap-node-renewal because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:14Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-config-server -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:14Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-config-server because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:14Z","reason":"SuccessfulCreate","message":"Created pod: machine-config-server-gj4pm","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:15Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/state=Done","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:15Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/desiredConfig=rendered-master-47246abc0cee5fbe972e47e23f330f37","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:15Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/currentConfig=rendered-master-47246abc0cee5fbe972e47e23f330f37","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:19Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:20Z","reason":"Created","message":"Created container: machine-config-server","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:20Z","reason":"Started","message":"Started container machine-config-server","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:21Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-os-builder -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:21Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-os-builder because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:21Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-os-builder-events because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:21Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-os-builder-anyuid because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:21Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-os-builder because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:21Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-os-builder-events -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:21Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-os-builder-events -n default because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:23Z","reason":"OperatorVersionChanged","message":"clusteroperator/machine-config version changed from [] to [{operator 4.18.35} {operator-image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015}]","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:23Z","reason":"SecretCreated","message":"Created Secret/worker-user-data-managed -n openshift-machine-api because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:37:32Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-rbac-proxy -n openshift-machine-config-operator:\ncause by changes in data.config-file.yaml","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:38:50Z","reason":"OperatorDegraded: MachineConfigControllerFailed","message":"Failed to resync 4.18.35 because: Could not make kubeconfig-data CM, configmaps \"kubeconfig-data\" already exists","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:38:51Z","reason":"ConfigDriftMonitorStarted","message":"Config Drift Monitor started, watching against rendered-master-47246abc0cee5fbe972e47e23f330f37","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:38:51Z","reason":"NodeDone","message":"Setting node master-0, currentConfig rendered-master-47246abc0cee5fbe972e47e23f330f37 to Done","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:38:51Z","reason":"Uncordon","message":"Update completed for config rendered-master-47246abc0cee5fbe972e47e23f330f37 and node has been uncordoned","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:38:51Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/reason=","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-03-20T08:38:57Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-rbac-proxy -n openshift-machine-config-operator:\ncause by changes in data.config-file.yaml","type":"Normal"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000010131615157203665020203 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:30:35Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-dddff6458 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:30:45Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-dddff6458-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:34:22Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-dddff6458-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:34:25Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:34:25Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-dddff6458-vx5d7","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:06Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-vx5d7 to master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:07Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.27/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:07Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:17Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:17Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:32Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:37Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" in 5.426s (5.426s including waiting). Image size: 506395599 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:41Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:41Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:42Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-dddff6458-vx5d7_42dfaabe-4d62-4065-a7d5-2d4427fae2d0 became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:42Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:42Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:42Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:42Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:44Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:44Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:44Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:44Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeschedulers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubeschedulers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeschedulers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:47Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:48Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:48Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:49Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:50Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:53Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:55Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:56Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:57Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:57Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:57Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"InstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:57Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"InstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:58Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:36:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:37:00Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:37:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:37:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:37:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:37:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:37:05Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:37:07Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:37:07Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:37:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:37:12Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:38:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-kube-scheduler-master-0)\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:38:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-kube-scheduler-master-0)\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-scheduler)\\nKubeControllerManagerStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:38:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-scheduler)\\nKubeControllerManagerStaticResourcesDegraded: \" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:38:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"configmap\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-20T08:38:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"configmap\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000000330515157203665016351 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-20T08:37:02Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.48/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-20T08:37:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-20T08:37:11Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-20T08:37:19Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.60/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-20T08:37:25Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-20T08:37:39Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-20T08:37:39Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000013030015157203665022013 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:30:32Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-ff989d6cc to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:30:53Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-ff989d6cc-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:34:22Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-ff989d6cc-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:34:25Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:34:25Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-ff989d6cc-qcpb4","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:06Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-qcpb4 to master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:07Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.18/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:07Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:16Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:18Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" in 2.39s (2.39s including waiting). Image size: 508888171 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"LeaderElection","message":"kube-controller-manager-operator-ff989d6cc-qcpb4_2978297d-0752-40c0-8095-d515a08a5ada became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:22Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:22Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:22Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:22Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:22Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-bhfwr\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:25Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:25Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:26Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:26Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:26Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:26Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:28Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:28Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:28Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-bhfwr\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:29Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:31Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:33Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:34Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:35Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nResourceSyncControllerDegraded: configmaps \\\"csr-controller-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/csr-controller-ca -n openshift-config-managed: configmaps \"csr-controller-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nResourceSyncControllerDegraded: configmaps \\\"csr-controller-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:44Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:48Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:53Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:53Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:54Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:55Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:55Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:55Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:57Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:57Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:36:59Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: no such host\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: no such host\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:09Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:10Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:11Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:11Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:17Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:37:26Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:38:46Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:38:47Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-20T08:38:47Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000000752715157203665020200 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-20T08:37:02Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.47/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-20T08:37:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-20T08:37:14Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-20T08:38:39Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_installer-2-master-0_openshift-kube-controller-manager_8b1c7a56-5d00-468a-bb8d-dbaf8e854951_0(c7f364ac5ac343cc49d7eb09efc4fc8a8e9a655adeeba4e984a9c0ca3e7b9153): error adding pod openshift-kube-controller-manager_installer-2-master-0 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"c7f364ac5ac343cc49d7eb09efc4fc8a8e9a655adeeba4e984a9c0ca3e7b9153\" Netns:\"/var/run/netns/60c6990c-6415-4a0b-ba8b-e62820d5aea5\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager;K8S_POD_NAME=installer-2-master-0;K8S_POD_INFRA_CONTAINER_ID=c7f364ac5ac343cc49d7eb09efc4fc8a8e9a655adeeba4e984a9c0ca3e7b9153;K8S_POD_UID=8b1c7a56-5d00-468a-bb8d-dbaf8e854951\" Path:\"\" ERRORED: error configuring pod [openshift-kube-controller-manager/installer-2-master-0] networking: Multus: [openshift-kube-controller-manager/installer-2-master-0/8b1c7a56-5d00-468a-bb8d-dbaf8e854951]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod installer-2-master-0 in out of cluster comm: SetNetworkStatus: failed to update the pod installer-2-master-0 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0?timeout=1m0s\": context deadline exceeded\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-20T08:38:40Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.61/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-20T08:38:46Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-20T08:38:47Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-20T08:38:47Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215157203665016372 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-20T08:37:09Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.59/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-20T08:37:14Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-20T08:37:20Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-20T08:37:20Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000021065615157203665020235 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:30:51Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-8b68b9d9b to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:30:53Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-8b68b9d9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:34:22Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-8b68b9d9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:34:24Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:34:24Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-8b68b9d9b-c6vkz","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:06Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-c6vkz to master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:07Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.13/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:07Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:07Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:07Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:08Z","reason":"LeaderElection","message":"kube-apiserver-operator-8b68b9d9b-c6vkz_2bd0786e-628d-4975-b853-0103ed13667e became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:08Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:09Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:09Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:10Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable message changed from \"All is well\" to \"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:10Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable changed from Unknown to True (\"All is well\"),EvaluationConditionsDetected changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:10Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:11Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"All is well\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:11Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:11Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:11Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:11Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:11Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:13Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:13Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:13Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:13Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:13Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:14Z","reason":"RotationError","message":"configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:14Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:14Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:14Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:14Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:14Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_ExternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:14Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:15Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:15Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:15Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:15Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:16Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:16Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_ExternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_ExternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:16Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:16Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:17Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:17Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:17Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:17Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:17Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:18Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:18Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:18Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:18Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:18Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:19Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:19Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:19Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_ExternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:22Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:22Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:22Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:22Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:22Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:22Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"RotationError","message":"configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:25Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:25Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:26Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:28Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:28Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:37Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:37Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:38Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:39Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:39Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:39Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:39Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:44Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:50Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:56Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:36:58Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:37:00Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:37:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:37:02Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:37:02Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:37:04Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:37:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:37:08Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:37:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:37:39Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:37:39Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:38:53Z","reason":"LeaderElection","message":"kube-apiserver-operator-8b68b9d9b-c6vkz_87b6548b-7a58-46f2-9005-cfa70afd4557 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-20T08:38:53Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001260615157203665014372 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:37:02Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.46/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:37:34Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:37:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:37:48Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:37:48Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:01Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:02Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:02Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:16Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:16Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:16Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:30Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:30Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:30Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:30Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:30Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:30Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:30Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:30Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:30Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:30Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:31Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:31Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:31Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:31Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-20T08:38:31Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000004000115157203665016211 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:30:36Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-8544cbcf9c to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:30:47Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-8544cbcf9c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:34:22Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-8544cbcf9c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:34:25Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:34:25Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-8544cbcf9c-brhw4","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:06Z","reason":"Scheduled","message":"Successfully assigned openshift-etcd-operator/etcd-operator-8544cbcf9c-brhw4 to master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:07Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.28/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:07Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:18Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:18Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:30Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:30Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" in 415ms (415ms including waiting). Image size: 518384969 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:31Z","reason":"LeaderElection","message":"etcd-operator-8544cbcf9c-brhw4_d2bf482f-20bc-4a90-b6b4-9ee766084981 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:31Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:31Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:31Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:31Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:31Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:33Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:33Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:34Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:34Z","reason":"ScriptControllerErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:35Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:35Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:37Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:37Z","reason":"EnvVarControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:37Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:37Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:37Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:38Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:39Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:41Z","reason":"EtcdEndpointsErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:38:32Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.28:8443/healthz\": dial tcp 10.128.0.28:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:38:32Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.28:8443/healthz\": dial tcp 10.128.0.28:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:38:46Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:38:47Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-20T08:38:47Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000001045615157203665016572 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:36:44Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-6fccff6869-f98nk to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:36:44Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-6fccff6869 to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:36:44Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-6fccff6869-f98nk","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:36:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.42/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:36:46Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:36:50Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-bc9b556d6-vdnq2","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:36:50Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-6fccff6869 to 0 from 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:36:50Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-6fccff6869-f98nk","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:36:50Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:36:50Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-bc9b556d6 to 1 from 0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:36:51Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\" in 5.003s (5.003s including waiting). Image size: 505345991 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:36:51Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:36:51Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:36:53Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-bc9b556d6-vdnq2 to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:37:02Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.45/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:37:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:37:03Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:37:04Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:37:05Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-20T08:37:05Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000361115157203665015121 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-03-20T08:36:42Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-20T08:36:42Z","reason":"SuccessfulCreate","message":"Created pod: router-default-7dcf5569b5-xmvwz","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-20T08:36:42Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-7dcf5569b5 to 1","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-20T08:37:07Z","reason":"Scheduled","message":"Successfully assigned openshift-ingress/router-default-7dcf5569b5-xmvwz to master-0","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-20T08:37:08Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777\"","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-20T08:37:38Z","reason":"Created","message":"Created container: router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-20T08:37:38Z","reason":"Started","message":"Started container router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-20T08:37:48Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-20T08:37:49Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [-]backend-http failed: reason withheld\n[-]has-synced failed: reason withheld\n[+]process-running ok\nhealthz check failed\n\n","type":"Warning"}]}events/openshift-authentication-operator.json0000640000000000000000000022551215157203665020325 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:30:39Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-5885bfd7f4 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:30:49Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5885bfd7f4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:34:21Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5885bfd7f4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:34:23Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:34:23Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-5885bfd7f4-62zrx","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:06Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-5885bfd7f4-62zrx to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:08Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.25/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:08Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:16Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:18Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\" in 2.698s (2.698s including waiting). Image size: 513221333 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:19Z","reason":"LeaderElection","message":"authentication-operator-5885bfd7f4-62zrx_7f42e53a-05c1-46ee-93f8-77b6bf5733e5 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to False (\"All is well\"),Progressing set to Unknown (\"\"),Available set to False (\"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+ \\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+ \\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:25Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:25Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:25Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-wjwxz\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:25Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-wjwxz\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:27Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:29Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:29Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:29Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:29Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:29Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:29Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\\"oauthConfig\\\": map[string]any{\\n+ \\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+ \\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+ \\t\\t\\t\\\"templates\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+ \\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n+ \\t\\t\\\"serverArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+ \\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+ \\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+ \\t\\t},\\n+ \\t\\t\\\"servingInfo\\\": map[string]any{\\n+ \\t\\t\\t\\\"cipherSuites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:30Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:30Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:31Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:32Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:36Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:37Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:37Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:37Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:37Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:40Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:41Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:44Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:49Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any{\\n \\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n \\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n \\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n \\t\\\"servingInfo\\\": map[string]any{\\n \\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n \\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t\\\"namedCertificates\\\": []any{\\n+ \\t\\t\\tmap[string]any{\\n+ \\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n \\t},\\n \\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n }\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:49Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:49Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:56Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:36:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:37:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:37:11Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:37:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.35\"}] to [{\"operator\" \"4.18.35\"} {\"oauth-apiserver\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:37:11Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:37:11Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:37:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:37:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:37:11Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:37:11Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:37:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.89.113:443/healthz\\\": dial tcp 172.30.89.113:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:38:28Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.25:8443/healthz\": dial tcp 10.128.0.25:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:38:28Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.25:8443/healthz\": dial tcp 10.128.0.25:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:38:46Z","reason":"Killing","message":"Container authentication-operator failed liveness probe, will be restarted","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:38:51Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:38:51Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:38:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-20T08:38:53Z","reason":"LeaderElection","message":"authentication-operator-5885bfd7f4-62zrx_218d68c0-baaf-4f14-94ad-45cca8749e7d became leader","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015157203665016302 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-20T08:36:43Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-20T08:36:43Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000002350515157203651014612 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":193,"namespaces":{"default":[{"name":"default","secrets":0}],"kube-public":[{"name":"default","secrets":0}],"kube-system":[{"name":"attachdetach-controller","secrets":0},{"name":"certificate-controller","secrets":0},{"name":"cloud-controller-manager","secrets":0},{"name":"clusterrole-aggregation-controller","secrets":0},{"name":"cronjob-controller","secrets":0},{"name":"daemon-set-controller","secrets":0},{"name":"default","secrets":0},{"name":"deployment-controller","secrets":0},{"name":"disruption-controller","secrets":0},{"name":"endpoint-controller","secrets":0},{"name":"endpointslice-controller","secrets":0},{"name":"endpointslicemirroring-controller","secrets":0},{"name":"ephemeral-volume-controller","secrets":0},{"name":"expand-controller","secrets":0},{"name":"generic-garbage-collector","secrets":0},{"name":"horizontal-pod-autoscaler","secrets":0},{"name":"job-controller","secrets":0},{"name":"legacy-service-account-token-cleaner","secrets":0},{"name":"namespace-controller","secrets":0},{"name":"node-controller","secrets":0},{"name":"persistent-volume-binder","secrets":0},{"name":"pod-garbage-collector","secrets":0},{"name":"pv-protection-controller","secrets":0},{"name":"pvc-protection-controller","secrets":0},{"name":"replicaset-controller","secrets":0},{"name":"replication-controller","secrets":0},{"name":"resourcequota-controller","secrets":0},{"name":"root-ca-cert-publisher","secrets":0},{"name":"service-account-controller","secrets":0},{"name":"service-ca-cert-publisher","secrets":0},{"name":"statefulset-controller","secrets":0},{"name":"ttl-after-finished-controller","secrets":0},{"name":"validatingadmissionpolicy-status-controller","secrets":0}],"openshift":[{"name":"default","secrets":0}],"openshift-apiserver":[{"name":"default","secrets":0},{"name":"openshift-apiserver-sa","secrets":0}],"openshift-apiserver-operator":[{"name":"default","secrets":0},{"name":"openshift-apiserver-operator","secrets":0}],"openshift-authentication":[{"name":"default","secrets":0},{"name":"oauth-openshift","secrets":0}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":0},{"name":"default","secrets":0}],"openshift-catalogd":[{"name":"catalogd-controller-manager","secrets":0},{"name":"default","secrets":0}],"openshift-cloud-controller-manager":[{"name":"cloud-controller-manager","secrets":0},{"name":"cloud-node-manager","secrets":0},{"name":"default","secrets":0}],"openshift-cloud-controller-manager-operator":[{"name":"cluster-cloud-controller-manager","secrets":0},{"name":"default","secrets":0}],"openshift-cloud-credential-operator":[{"name":"cloud-credential-operator","secrets":0},{"name":"default","secrets":0}],"openshift-cloud-network-config-controller":[{"name":"default","secrets":0}],"openshift-cloud-platform-infra":[{"name":"default","secrets":0}],"openshift-cluster-csi-drivers":[{"name":"default","secrets":0}],"openshift-cluster-machine-approver":[{"name":"default","secrets":0},{"name":"machine-approver-sa","secrets":0}],"openshift-cluster-node-tuning-operator":[{"name":"cluster-node-tuning-operator","secrets":0},{"name":"default","secrets":0},{"name":"tuned","secrets":0}],"openshift-cluster-olm-operator":[{"name":"cluster-olm-operator","secrets":0},{"name":"default","secrets":0}],"openshift-cluster-samples-operator":[{"name":"cluster-samples-operator","secrets":0},{"name":"default","secrets":0}],"openshift-cluster-storage-operator":[{"name":"cluster-storage-operator","secrets":0},{"name":"csi-snapshot-controller","secrets":0},{"name":"csi-snapshot-controller-operator","secrets":0},{"name":"default","secrets":0}],"openshift-cluster-version":[{"name":"default","secrets":0}],"openshift-config":[{"name":"default","secrets":0}],"openshift-config-managed":[{"name":"default","secrets":0}],"openshift-config-operator":[{"name":"default","secrets":0},{"name":"openshift-config-operator","secrets":0}],"openshift-controller-manager":[{"name":"default","secrets":0},{"name":"openshift-controller-manager-sa","secrets":0}],"openshift-controller-manager-operator":[{"name":"default","secrets":0},{"name":"openshift-controller-manager-operator","secrets":0}],"openshift-dns":[{"name":"default","secrets":0},{"name":"dns","secrets":0},{"name":"node-resolver","secrets":0}],"openshift-dns-operator":[{"name":"default","secrets":0},{"name":"dns-operator","secrets":0}],"openshift-etcd":[{"name":"default","secrets":0},{"name":"etcd-backup-sa","secrets":0},{"name":"etcd-sa","secrets":0},{"name":"installer-sa","secrets":0}],"openshift-etcd-operator":[{"name":"default","secrets":0},{"name":"etcd-operator","secrets":0}],"openshift-host-network":[{"name":"default","secrets":0}],"openshift-image-registry":[{"name":"cluster-image-registry-operator","secrets":0},{"name":"default","secrets":0},{"name":"node-ca","secrets":0},{"name":"pruner","secrets":0}],"openshift-infra":[{"name":"cluster-csr-approver-controller","secrets":0},{"name":"cluster-quota-reconciliation-controller","secrets":0},{"name":"default","secrets":0},{"name":"ingress-to-route-controller","secrets":0},{"name":"namespace-security-allocation-controller","secrets":0},{"name":"node-bootstrapper","secrets":0},{"name":"podsecurity-admission-label-syncer-controller","secrets":0},{"name":"privileged-namespaces-psa-label-syncer","secrets":0},{"name":"pv-recycler-controller","secrets":0},{"name":"resourcequota-controller","secrets":0}],"openshift-ingress":[{"name":"default","secrets":0},{"name":"router","secrets":0}],"openshift-ingress-operator":[{"name":"default","secrets":0},{"name":"ingress-operator","secrets":0}],"openshift-insights":[{"name":"default","secrets":0},{"name":"gather","secrets":0},{"name":"operator","secrets":0}],"openshift-kni-infra":[{"name":"default","secrets":0}],"openshift-kube-apiserver":[{"name":"default","secrets":0},{"name":"installer-sa","secrets":0},{"name":"localhost-recovery-client","secrets":0}],"openshift-kube-apiserver-operator":[{"name":"default","secrets":0},{"name":"kube-apiserver-operator","secrets":0}],"openshift-kube-controller-manager":[{"name":"default","secrets":0},{"name":"installer-sa","secrets":0},{"name":"kube-controller-manager-sa","secrets":0},{"name":"localhost-recovery-client","secrets":0}],"openshift-kube-controller-manager-operator":[{"name":"default","secrets":0},{"name":"kube-controller-manager-operator","secrets":0}],"openshift-kube-scheduler":[{"name":"default","secrets":0},{"name":"installer-sa","secrets":0},{"name":"localhost-recovery-client","secrets":0},{"name":"openshift-kube-scheduler-sa","secrets":0}],"openshift-kube-scheduler-operator":[{"name":"default","secrets":0},{"name":"openshift-kube-scheduler-operator","secrets":0}],"openshift-kube-storage-version-migrator":[{"name":"default","secrets":0},{"name":"kube-storage-version-migrator-sa","secrets":0}],"openshift-kube-storage-version-migrator-operator":[{"name":"default","secrets":0},{"name":"kube-storage-version-migrator-operator","secrets":0}],"openshift-machine-api":[{"name":"cluster-autoscaler","secrets":0},{"name":"cluster-autoscaler-operator","secrets":0},{"name":"cluster-baremetal-operator","secrets":0},{"name":"control-plane-machine-set-operator","secrets":0},{"name":"default","secrets":0},{"name":"machine-api-controllers","secrets":0},{"name":"machine-api-operator","secrets":0},{"name":"machine-api-termination-handler","secrets":0}],"openshift-machine-config-operator":[{"name":"default","secrets":0},{"name":"machine-config-controller","secrets":0},{"name":"machine-config-daemon","secrets":0},{"name":"machine-config-operator","secrets":0},{"name":"machine-config-server","secrets":0},{"name":"machine-os-builder","secrets":0},{"name":"machine-os-puller","secrets":0},{"name":"node-bootstrapper","secrets":0}],"openshift-marketplace":[{"name":"certified-operators","secrets":0},{"name":"community-operators","secrets":0},{"name":"default","secrets":0},{"name":"marketplace-operator","secrets":0},{"name":"redhat-marketplace","secrets":0},{"name":"redhat-operators","secrets":0}],"openshift-monitoring":[{"name":"cluster-monitoring-operator","secrets":0},{"name":"default","secrets":0},{"name":"prometheus-operator","secrets":0},{"name":"prometheus-operator-admission-webhook","secrets":0}],"openshift-multus":[{"name":"default","secrets":0},{"name":"metrics-daemon-sa","secrets":0},{"name":"multus","secrets":0},{"name":"multus-ac","secrets":0},{"name":"multus-ancillary-tools","secrets":0}],"openshift-network-diagnostics":[{"name":"default","secrets":0},{"name":"network-diagnostics","secrets":0}],"openshift-network-node-identity":[{"name":"default","secrets":0},{"name":"network-node-identity","secrets":0}],"openshift-network-operator":[{"name":"cluster-network-operator","secrets":0},{"name":"default","secrets":0},{"name":"iptables-alerter","secrets":0}],"openshift-node":[{"name":"default","secrets":0}],"openshift-nutanix-infra":[{"name":"default","secrets":0}],"openshift-oauth-apiserver":[{"name":"default","secrets":0},{"name":"oauth-apiserver-sa","secrets":0}],"openshift-openstack-infra":[{"name":"default","secrets":0}],"openshift-operator-controller":[{"name":"default","secrets":0},{"name":"operator-controller-controller-manager","secrets":0}],"openshift-operator-lifecycle-manager":[{"name":"default","secrets":0},{"name":"olm-operator-serviceaccount","secrets":0}],"openshift-operators":[{"name":"default","secrets":0}],"openshift-ovirt-infra":[{"name":"default","secrets":0}],"openshift-ovn-kubernetes":[{"name":"default","secrets":0},{"name":"ovn-kubernetes-control-plane","secrets":0},{"name":"ovn-kubernetes-node","secrets":0}],"openshift-route-controller-manager":[{"name":"default","secrets":0},{"name":"route-controller-manager-sa","secrets":0}],"openshift-service-ca":[{"name":"default","secrets":0},{"name":"service-ca","secrets":0}],"openshift-service-ca-operator":[{"name":"default","secrets":0},{"name":"service-ca-operator","secrets":0}],"openshift-user-workload-monitoring":[{"name":"default","secrets":0}],"openshift-vsphere-infra":[{"name":"default","secrets":0}]}}}config/installplans.json0000640000000000000000000000010015157203650014077 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000007507415157203636014556 0ustar0000000000000000Mar 20 08:38:08.476986 master-0 kubenswrapper[7465]: I0320 08:38:08.476781 7465 patch_prober.go:28] interesting pod/authentication-operator-5885bfd7f4-62zrx container/authentication-operator namespace/openshift-authentication-operator: Liveness probe status=failure output="Get \"https://10.128.0.25:8443/healthz\": dial tcp 10.128.0.25:8443: connect: connection refused" start-of-body= Mar 20 08:38:08.476986 master-0 kubenswrapper[7465]: I0320 08:38:08.476890 7465 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-authentication-operator/authentication-operator-5885bfd7f4-62zrx" podUID="29b5b089-fb1d-46a1-bd67-2e0ba03c76a6" containerName="authentication-operator" probeResult="failure" output="Get \"https://10.128.0.25:8443/healthz\": dial tcp 10.128.0.25:8443: connect: connection refused" Mar 20 08:38:08.551493 master-0 kubenswrapper[7465]: E0320 08:38:08.551235 7465 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{etcd-master-0-master-0.189e7fd4a698ed56 openshift-etcd 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-etcd,Name:etcd-master-0-master-0,UID:d664a6d0d2a24360dee10612610f1b59,APIVersion:v1,ResourceVersion:,FieldPath:spec.containers{etcd},},Reason:Killing,Message:Stopping container etcd,Source:EventSource{Component:kubelet,Host:master-0,},FirstTimestamp:2026-03-20 08:37:34.535388502 +0000 UTC m=+80.178704012,LastTimestamp:2026-03-20 08:37:34.535388502 +0000 UTC m=+80.178704012,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:master-0,}" Mar 20 08:38:16.054023 master-0 kubenswrapper[7465]: E0320 08:38:16.053951 7465 kubelet.go:1929] "Failed creating a mirror pod for" err="Internal error occurred: admission plugin \"LimitRanger\" failed to complete mutation in 13s" pod="openshift-etcd/etcd-master-0" Mar 20 08:38:16.470755 master-0 kubenswrapper[7465]: E0320 08:38:16.470588 7465 controller.go:195] "Failed to update lease" err="Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 20 08:38:17.632858 master-0 kubenswrapper[7465]: E0320 08:38:17.632770 7465 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 20 08:38:18.475228 master-0 kubenswrapper[7465]: I0320 08:38:18.475123 7465 patch_prober.go:28] interesting pod/authentication-operator-5885bfd7f4-62zrx container/authentication-operator namespace/openshift-authentication-operator: Liveness probe status=failure output="Get \"https://10.128.0.25:8443/healthz\": dial tcp 10.128.0.25:8443: connect: connection refused" start-of-body= Mar 20 08:38:18.475964 master-0 kubenswrapper[7465]: I0320 08:38:18.475255 7465 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-authentication-operator/authentication-operator-5885bfd7f4-62zrx" podUID="29b5b089-fb1d-46a1-bd67-2e0ba03c76a6" containerName="authentication-operator" probeResult="failure" output="Get \"https://10.128.0.25:8443/healthz\": dial tcp 10.128.0.25:8443: connect: connection refused" Mar 20 08:38:26.471494 master-0 kubenswrapper[7465]: E0320 08:38:26.471399 7465 controller.go:195] "Failed to update lease" err="Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": context deadline exceeded" Mar 20 08:38:27.634176 master-0 kubenswrapper[7465]: E0320 08:38:27.634111 7465 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 20 08:38:28.475373 master-0 kubenswrapper[7465]: I0320 08:38:28.475288 7465 patch_prober.go:28] interesting pod/authentication-operator-5885bfd7f4-62zrx container/authentication-operator namespace/openshift-authentication-operator: Liveness probe status=failure output="Get \"https://10.128.0.25:8443/healthz\": dial tcp 10.128.0.25:8443: connect: connection refused" start-of-body= Mar 20 08:38:28.475744 master-0 kubenswrapper[7465]: I0320 08:38:28.475385 7465 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-authentication-operator/authentication-operator-5885bfd7f4-62zrx" podUID="29b5b089-fb1d-46a1-bd67-2e0ba03c76a6" containerName="authentication-operator" probeResult="failure" output="Get \"https://10.128.0.25:8443/healthz\": dial tcp 10.128.0.25:8443: connect: connection refused" Mar 20 08:38:30.190708 master-0 kubenswrapper[7465]: E0320 08:38:30.190593 7465 kubelet.go:1929] "Failed creating a mirror pod for" err="Internal error occurred: admission plugin \"LimitRanger\" failed to complete mutation in 13s" pod="openshift-etcd/etcd-master-0" Mar 20 08:38:32.083873 master-0 kubenswrapper[7465]: I0320 08:38:32.083784 7465 patch_prober.go:28] interesting pod/etcd-operator-8544cbcf9c-brhw4 container/etcd-operator namespace/openshift-etcd-operator: Liveness probe status=failure output="Get \"https://10.128.0.28:8443/healthz\": dial tcp 10.128.0.28:8443: connect: connection refused" start-of-body= Mar 20 08:38:32.083873 master-0 kubenswrapper[7465]: I0320 08:38:32.083850 7465 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-etcd-operator/etcd-operator-8544cbcf9c-brhw4" podUID="f046860d-2d54-4746-8ba2-f8e90fa55e38" containerName="etcd-operator" probeResult="failure" output="Get \"https://10.128.0.28:8443/healthz\": dial tcp 10.128.0.28:8443: connect: connection refused" Mar 20 08:38:36.472939 master-0 kubenswrapper[7465]: E0320 08:38:36.472841 7465 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="200ms" Mar 20 08:38:37.635316 master-0 kubenswrapper[7465]: E0320 08:38:37.635063 7465 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 20 08:38:37.635316 master-0 kubenswrapper[7465]: E0320 08:38:37.635153 7465 kubelet_node_status.go:572] "Unable to update node status" err="update node status exceeds retry count" Mar 20 08:38:39.053841 master-0 kubenswrapper[7465]: E0320 08:38:39.053692 7465 log.go:32] "RunPodSandbox from runtime service failed" err=< Mar 20 08:38:39.055442 master-0 kubenswrapper[7465]: E0320 08:38:39.055347 7465 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err=< Mar 20 08:38:39.055602 master-0 kubenswrapper[7465]: E0320 08:38:39.055485 7465 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err=< Mar 20 08:38:39.055742 master-0 kubenswrapper[7465]: E0320 08:38:39.055621 7465 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"cluster-autoscaler-operator-866dc4744-xwxg7_openshift-machine-api(21bebade-17fa-444e-92a9-eea53d6cd673)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"cluster-autoscaler-operator-866dc4744-xwxg7_openshift-machine-api(21bebade-17fa-444e-92a9-eea53d6cd673)\\\": rpc error: code = Unknown desc = failed to create pod network sandbox k8s_cluster-autoscaler-operator-866dc4744-xwxg7_openshift-machine-api_21bebade-17fa-444e-92a9-eea53d6cd673_0(eea5c777fab069276340fb8b8e8bc932a48b37c137af14866a4f948ceb435c50): error adding pod openshift-machine-api_cluster-autoscaler-operator-866dc4744-xwxg7 to CNI network \\\"multus-cni-network\\\": plugin type=\\\"multus-shim\\\" name=\\\"multus-cni-network\\\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\\\"eea5c777fab069276340fb8b8e8bc932a48b37c137af14866a4f948ceb435c50\\\" Netns:\\\"/var/run/netns/cf3886d6-d600-4c57-baf9-25c23fb5edd0\\\" IfName:\\\"eth0\\\" Args:\\\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=cluster-autoscaler-operator-866dc4744-xwxg7;K8S_POD_INFRA_CONTAINER_ID=eea5c777fab069276340fb8b8e8bc932a48b37c137af14866a4f948ceb435c50;K8S_POD_UID=21bebade-17fa-444e-92a9-eea53d6cd673\\\" Path:\\\"\\\" ERRORED: error configuring pod [openshift-machine-api/cluster-autoscaler-operator-866dc4744-xwxg7] networking: Multus: [openshift-machine-api/cluster-autoscaler-operator-866dc4744-xwxg7/21bebade-17fa-444e-92a9-eea53d6cd673]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod cluster-autoscaler-operator-866dc4744-xwxg7 in out of cluster comm: SetNetworkStatus: failed to update the pod cluster-autoscaler-operator-866dc4744-xwxg7 in out of cluster comm: status update failed for pod /: Get \\\"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/cluster-autoscaler-operator-866dc4744-xwxg7?timeout=1m0s\\\": context deadline exceeded\\n': StdinData: {\\\"binDir\\\":\\\"/var/lib/cni/bin\\\",\\\"clusterNetwork\\\":\\\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\\\",\\\"cniVersion\\\":\\\"0.3.1\\\",\\\"daemonSocketDir\\\":\\\"/run/multus/socket\\\",\\\"globalNamespaces\\\":\\\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\\\",\\\"logLevel\\\":\\\"verbose\\\",\\\"logToStderr\\\":true,\\\"name\\\":\\\"multus-cni-network\\\",\\\"namespaceIsolation\\\":true,\\\"type\\\":\\\"multus-shim\\\"}\"" pod="openshift-machine-api/cluster-autoscaler-operator-866dc4744-xwxg7" podUID="21bebade-17fa-444e-92a9-eea53d6cd673" Mar 20 08:38:39.202865 master-0 kubenswrapper[7465]: E0320 08:38:39.202790 7465 log.go:32] "RunPodSandbox from runtime service failed" err=< Mar 20 08:38:39.203052 master-0 kubenswrapper[7465]: E0320 08:38:39.202897 7465 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err=< Mar 20 08:38:39.203052 master-0 kubenswrapper[7465]: E0320 08:38:39.202922 7465 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err=< Mar 20 08:38:39.203052 master-0 kubenswrapper[7465]: E0320 08:38:39.203000 7465 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"cluster-samples-operator-85f7577d78-mwfgx_openshift-cluster-samples-operator(e3bf8eaf-5f6c-41a6-aaeb-6c921d789466)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"cluster-samples-operator-85f7577d78-mwfgx_openshift-cluster-samples-operator(e3bf8eaf-5f6c-41a6-aaeb-6c921d789466)\\\": rpc error: code = Unknown desc = failed to create pod network sandbox k8s_cluster-samples-operator-85f7577d78-mwfgx_openshift-cluster-samples-operator_e3bf8eaf-5f6c-41a6-aaeb-6c921d789466_0(ca850c7655dc9ec8e9a1fbbcce67531da5122d6e0d326f12b4ff2fa81952ebba): error adding pod openshift-cluster-samples-operator_cluster-samples-operator-85f7577d78-mwfgx to CNI network \\\"multus-cni-network\\\": plugin type=\\\"multus-shim\\\" name=\\\"multus-cni-network\\\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\\\"ca850c7655dc9ec8e9a1fbbcce67531da5122d6e0d326f12b4ff2fa81952ebba\\\" Netns:\\\"/var/run/netns/87752d08-ed34-4f8b-a26a-f4ed4ca16e8e\\\" IfName:\\\"eth0\\\" Args:\\\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-cluster-samples-operator;K8S_POD_NAME=cluster-samples-operator-85f7577d78-mwfgx;K8S_POD_INFRA_CONTAINER_ID=ca850c7655dc9ec8e9a1fbbcce67531da5122d6e0d326f12b4ff2fa81952ebba;K8S_POD_UID=e3bf8eaf-5f6c-41a6-aaeb-6c921d789466\\\" Path:\\\"\\\" ERRORED: error configuring pod [openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78-mwfgx] networking: Multus: [openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78-mwfgx/e3bf8eaf-5f6c-41a6-aaeb-6c921d789466]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod cluster-samples-operator-85f7577d78-mwfgx in out of cluster comm: SetNetworkStatus: failed to update the pod cluster-samples-operator-85f7577d78-mwfgx in out of cluster comm: status update failed for pod /: Get \\\"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-cluster-samples-operator/pods/cluster-samples-operator-85f7577d78-mwfgx?timeout=1m0s\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\n': StdinData: {\\\"binDir\\\":\\\"/var/lib/cni/bin\\\",\\\"clusterNetwork\\\":\\\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\\\",\\\"cniVersion\\\":\\\"0.3.1\\\",\\\"daemonSocketDir\\\":\\\"/run/multus/socket\\\",\\\"globalNamespaces\\\":\\\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\\\",\\\"logLevel\\\":\\\"verbose\\\",\\\"logToStderr\\\":true,\\\"name\\\":\\\"multus-cni-network\\\",\\\"namespaceIsolation\\\":true,\\\"type\\\":\\\"multus-shim\\\"}\"" pod="openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78-mwfgx" podUID="e3bf8eaf-5f6c-41a6-aaeb-6c921d789466" Mar 20 08:38:39.222520 master-0 kubenswrapper[7465]: E0320 08:38:39.222404 7465 log.go:32] "RunPodSandbox from runtime service failed" err=< Mar 20 08:38:39.222732 master-0 kubenswrapper[7465]: E0320 08:38:39.222574 7465 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err=< Mar 20 08:38:39.222732 master-0 kubenswrapper[7465]: E0320 08:38:39.222631 7465 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err=< Mar 20 08:38:39.223113 master-0 kubenswrapper[7465]: E0320 08:38:39.222793 7465 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"control-plane-machine-set-operator-6f97756bc8-7t5qv_openshift-machine-api(e9e912c1-a2d4-4d78-98c1-ea3b232ddd7e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"control-plane-machine-set-operator-6f97756bc8-7t5qv_openshift-machine-api(e9e912c1-a2d4-4d78-98c1-ea3b232ddd7e)\\\": rpc error: code = Unknown desc = failed to create pod network sandbox k8s_control-plane-machine-set-operator-6f97756bc8-7t5qv_openshift-machine-api_e9e912c1-a2d4-4d78-98c1-ea3b232ddd7e_0(9dbc34ec166af95a7853428b41cee350fe85c8c54be4aa6e328035aa02204cfc): error adding pod openshift-machine-api_control-plane-machine-set-operator-6f97756bc8-7t5qv to CNI network \\\"multus-cni-network\\\": plugin type=\\\"multus-shim\\\" name=\\\"multus-cni-network\\\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\\\"9dbc34ec166af95a7853428b41cee350fe85c8c54be4aa6e328035aa02204cfc\\\" Netns:\\\"/var/run/netns/528b4df4-56d0-4831-a96c-32b3710c2f88\\\" IfName:\\\"eth0\\\" Args:\\\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=control-plane-machine-set-operator-6f97756bc8-7t5qv;K8S_POD_INFRA_CONTAINER_ID=9dbc34ec166af95a7853428b41cee350fe85c8c54be4aa6e328035aa02204cfc;K8S_POD_UID=e9e912c1-a2d4-4d78-98c1-ea3b232ddd7e\\\" Path:\\\"\\\" ERRORED: error configuring pod [openshift-machine-api/control-plane-machine-set-operator-6f97756bc8-7t5qv] networking: Multus: [openshift-machine-api/control-plane-machine-set-operator-6f97756bc8-7t5qv/e9e912c1-a2d4-4d78-98c1-ea3b232ddd7e]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod control-plane-machine-set-operator-6f97756bc8-7t5qv in out of cluster comm: SetNetworkStatus: failed to update the pod control-plane-machine-set-operator-6f97756bc8-7t5qv in out of cluster comm: status update failed for pod /: Get \\\"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/control-plane-machine-set-operator-6f97756bc8-7t5qv?timeout=1m0s\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\n': StdinData: {\\\"binDir\\\":\\\"/var/lib/cni/bin\\\",\\\"clusterNetwork\\\":\\\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\\\",\\\"cniVersion\\\":\\\"0.3.1\\\",\\\"daemonSocketDir\\\":\\\"/run/multus/socket\\\",\\\"globalNamespaces\\\":\\\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\\\",\\\"logLevel\\\":\\\"verbose\\\",\\\"logToStderr\\\":true,\\\"name\\\":\\\"multus-cni-network\\\",\\\"namespaceIsolation\\\":true,\\\"type\\\":\\\"multus-shim\\\"}\"" pod="openshift-machine-api/control-plane-machine-set-operator-6f97756bc8-7t5qv" podUID="e9e912c1-a2d4-4d78-98c1-ea3b232ddd7e" Mar 20 08:38:39.403811 master-0 kubenswrapper[7465]: E0320 08:38:39.403637 7465 log.go:32] "RunPodSandbox from runtime service failed" err=< Mar 20 08:38:39.404017 master-0 kubenswrapper[7465]: E0320 08:38:39.403896 7465 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err=< Mar 20 08:38:39.404017 master-0 kubenswrapper[7465]: E0320 08:38:39.403949 7465 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err=< Mar 20 08:38:39.404304 master-0 kubenswrapper[7465]: E0320 08:38:39.404071 7465 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"insights-operator-68bf6ff9d6-mvfn5_openshift-insights(f2217de0-7805-4f5f-8ea5-93b81b7e0236)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"insights-operator-68bf6ff9d6-mvfn5_openshift-insights(f2217de0-7805-4f5f-8ea5-93b81b7e0236)\\\": rpc error: code = Unknown desc = failed to create pod network sandbox k8s_insights-operator-68bf6ff9d6-mvfn5_openshift-insights_f2217de0-7805-4f5f-8ea5-93b81b7e0236_0(6e679c83d9e07e8539cd4ee0b9a66261e4e8939cdf7af15cbfbb7e5cfaad82f9): error adding pod openshift-insights_insights-operator-68bf6ff9d6-mvfn5 to CNI network \\\"multus-cni-network\\\": plugin type=\\\"multus-shim\\\" name=\\\"multus-cni-network\\\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\\\"6e679c83d9e07e8539cd4ee0b9a66261e4e8939cdf7af15cbfbb7e5cfaad82f9\\\" Netns:\\\"/var/run/netns/06f0a4c8-4a3a-400f-a230-8a6ef7f51225\\\" IfName:\\\"eth0\\\" Args:\\\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-insights;K8S_POD_NAME=insights-operator-68bf6ff9d6-mvfn5;K8S_POD_INFRA_CONTAINER_ID=6e679c83d9e07e8539cd4ee0b9a66261e4e8939cdf7af15cbfbb7e5cfaad82f9;K8S_POD_UID=f2217de0-7805-4f5f-8ea5-93b81b7e0236\\\" Path:\\\"\\\" ERRORED: error configuring pod [openshift-insights/insights-operator-68bf6ff9d6-mvfn5] networking: Multus: [openshift-insights/insights-operator-68bf6ff9d6-mvfn5/f2217de0-7805-4f5f-8ea5-93b81b7e0236]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod insights-operator-68bf6ff9d6-mvfn5 in out of cluster comm: SetNetworkStatus: failed to update the pod insights-operator-68bf6ff9d6-mvfn5 in out of cluster comm: status update failed for pod /: Get \\\"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-insights/pods/insights-operator-68bf6ff9d6-mvfn5?timeout=1m0s\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\n': StdinData: {\\\"binDir\\\":\\\"/var/lib/cni/bin\\\",\\\"clusterNetwork\\\":\\\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\\\",\\\"cniVersion\\\":\\\"0.3.1\\\",\\\"daemonSocketDir\\\":\\\"/run/multus/socket\\\",\\\"globalNamespaces\\\":\\\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\\\",\\\"logLevel\\\":\\\"verbose\\\",\\\"logToStderr\\\":true,\\\"name\\\":\\\"multus-cni-network\\\",\\\"namespaceIsolation\\\":true,\\\"type\\\":\\\"multus-shim\\\"}\"" pod="openshift-insights/insights-operator-68bf6ff9d6-mvfn5" podUID="f2217de0-7805-4f5f-8ea5-93b81b7e0236" Mar 20 08:38:39.424557 master-0 kubenswrapper[7465]: E0320 08:38:39.424464 7465 log.go:32] "RunPodSandbox from runtime service failed" err=< Mar 20 08:38:39.425034 master-0 kubenswrapper[7465]: E0320 08:38:39.424596 7465 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err=< Mar 20 08:38:39.425034 master-0 kubenswrapper[7465]: E0320 08:38:39.424643 7465 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err=< Mar 20 08:38:39.425034 master-0 kubenswrapper[7465]: E0320 08:38:39.424800 7465 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"cloud-credential-operator-744f9dbf77-r4qvh_openshift-cloud-credential-operator(469183dd-dc54-467d-82a1-611132ae8ec4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"cloud-credential-operator-744f9dbf77-r4qvh_openshift-cloud-credential-operator(469183dd-dc54-467d-82a1-611132ae8ec4)\\\": rpc error: code = Unknown desc = failed to create pod network sandbox k8s_cloud-credential-operator-744f9dbf77-r4qvh_openshift-cloud-credential-operator_469183dd-dc54-467d-82a1-611132ae8ec4_0(41dcb504e61c8c9db109ecb73d18ade9019dd987172fffe0bc5955fea5e2bd2a): error adding pod openshift-cloud-credential-operator_cloud-credential-operator-744f9dbf77-r4qvh to CNI network \\\"multus-cni-network\\\": plugin type=\\\"multus-shim\\\" name=\\\"multus-cni-network\\\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\\\"41dcb504e61c8c9db109ecb73d18ade9019dd987172fffe0bc5955fea5e2bd2a\\\" Netns:\\\"/var/run/netns/9ad75b80-3551-465a-a3ca-a85581db5fef\\\" IfName:\\\"eth0\\\" Args:\\\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-cloud-credential-operator;K8S_POD_NAME=cloud-credential-operator-744f9dbf77-r4qvh;K8S_POD_INFRA_CONTAINER_ID=41dcb504e61c8c9db109ecb73d18ade9019dd987172fffe0bc5955fea5e2bd2a;K8S_POD_UID=469183dd-dc54-467d-82a1-611132ae8ec4\\\" Path:\\\"\\\" ERRORED: error configuring pod [openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77-r4qvh] networking: Multus: [openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77-r4qvh/469183dd-dc54-467d-82a1-611132ae8ec4]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod cloud-credential-operator-744f9dbf77-r4qvh in out of cluster comm: SetNetworkStatus: failed to update the pod cloud-credential-operator-744f9dbf77-r4qvh in out of cluster comm: status update failed for pod /: Get \\\"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-cloud-credential-operator/pods/cloud-credential-operator-744f9dbf77-r4qvh?timeout=1m0s\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\n': StdinData: {\\\"binDir\\\":\\\"/var/lib/cni/bin\\\",\\\"clusterNetwork\\\":\\\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\\\",\\\"cniVersion\\\":\\\"0.3.1\\\",\\\"daemonSocketDir\\\":\\\"/run/multus/socket\\\",\\\"globalNamespaces\\\":\\\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\\\",\\\"logLevel\\\":\\\"verbose\\\",\\\"logToStderr\\\":true,\\\"name\\\":\\\"multus-cni-network\\\",\\\"namespaceIsolation\\\":true,\\\"type\\\":\\\"multus-shim\\\"}\"" pod="openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77-r4qvh" podUID="469183dd-dc54-467d-82a1-611132ae8ec4" Mar 20 08:38:39.468805 master-0 kubenswrapper[7465]: E0320 08:38:39.468736 7465 log.go:32] "RunPodSandbox from runtime service failed" err=< Mar 20 08:38:39.469004 master-0 kubenswrapper[7465]: E0320 08:38:39.468859 7465 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err=< Mar 20 08:38:39.469004 master-0 kubenswrapper[7465]: E0320 08:38:39.468900 7465 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err=< Mar 20 08:38:39.469208 master-0 kubenswrapper[7465]: E0320 08:38:39.469037 7465 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"installer-2-master-0_openshift-kube-controller-manager(8b1c7a56-5d00-468a-bb8d-dbaf8e854951)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"installer-2-master-0_openshift-kube-controller-manager(8b1c7a56-5d00-468a-bb8d-dbaf8e854951)\\\": rpc error: code = Unknown desc = failed to create pod network sandbox k8s_installer-2-master-0_openshift-kube-controller-manager_8b1c7a56-5d00-468a-bb8d-dbaf8e854951_0(c7f364ac5ac343cc49d7eb09efc4fc8a8e9a655adeeba4e984a9c0ca3e7b9153): error adding pod openshift-kube-controller-manager_installer-2-master-0 to CNI network \\\"multus-cni-network\\\": plugin type=\\\"multus-shim\\\" name=\\\"multus-cni-network\\\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\\\"c7f364ac5ac343cc49d7eb09efc4fc8a8e9a655adeeba4e984a9c0ca3e7b9153\\\" Netns:\\\"/var/run/netns/60c6990c-6415-4a0b-ba8b-e62820d5aea5\\\" IfName:\\\"eth0\\\" Args:\\\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager;K8S_POD_NAME=installer-2-master-0;K8S_POD_INFRA_CONTAINER_ID=c7f364ac5ac343cc49d7eb09efc4fc8a8e9a655adeeba4e984a9c0ca3e7b9153;K8S_POD_UID=8b1c7a56-5d00-468a-bb8d-dbaf8e854951\\\" Path:\\\"\\\" ERRORED: error configuring pod [openshift-kube-controller-manager/installer-2-master-0] networking: Multus: [openshift-kube-controller-manager/installer-2-master-0/8b1c7a56-5d00-468a-bb8d-dbaf8e854951]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod installer-2-master-0 in out of cluster comm: SetNetworkStatus: failed to update the pod installer-2-master-0 in out of cluster comm: status update failed for pod /: Get \\\"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0?timeout=1m0s\\\": context deadline exceeded\\n': StdinData: {\\\"binDir\\\":\\\"/var/lib/cni/bin\\\",\\\"clusterNetwork\\\":\\\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\\\",\\\"cniVersion\\\":\\\"0.3.1\\\",\\\"daemonSocketDir\\\":\\\"/run/multus/socket\\\",\\\"globalNamespaces\\\":\\\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\\\",\\\"logLevel\\\":\\\"verbose\\\",\\\"logToStderr\\\":true,\\\"name\\\":\\\"multus-cni-network\\\",\\\"namespaceIsolation\\\":true,\\\"type\\\":\\\"multus-shim\\\"}\"" pod="openshift-kube-controller-manager/installer-2-master-0" podUID="8b1c7a56-5d00-468a-bb8d-dbaf8e854951" Mar 20 08:38:39.521743 master-0 kubenswrapper[7465]: E0320 08:38:39.521676 7465 log.go:32] "RunPodSandbox from runtime service failed" err=< Mar 20 08:38:39.521962 master-0 kubenswrapper[7465]: E0320 08:38:39.521777 7465 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err=< Mar 20 08:38:39.521962 master-0 kubenswrapper[7465]: E0320 08:38:39.521803 7465 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err=< Mar 20 08:38:39.521962 master-0 kubenswrapper[7465]: E0320 08:38:39.521882 7465 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"machine-api-operator-6fbb6cf6f9-n8tnn_openshift-machine-api(c7f5e6cd-e093-409a-8758-d3db7a7eb32c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"machine-api-operator-6fbb6cf6f9-n8tnn_openshift-machine-api(c7f5e6cd-e093-409a-8758-d3db7a7eb32c)\\\": rpc error: code = Unknown desc = failed to create pod network sandbox k8s_machine-api-operator-6fbb6cf6f9-n8tnn_openshift-machine-api_c7f5e6cd-e093-409a-8758-d3db7a7eb32c_0(a48640ea906a4e679db30d8ed63617d252b5836d193a04691bdbafc25f9a7a5d): error adding pod openshift-machine-api_machine-api-operator-6fbb6cf6f9-n8tnn to CNI network \\\"multus-cni-network\\\": plugin type=\\\"multus-shim\\\" name=\\\"multus-cni-network\\\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\\\"a48640ea906a4e679db30d8ed63617d252b5836d193a04691bdbafc25f9a7a5d\\\" Netns:\\\"/var/run/netns/60ecd76f-554b-4846-9272-ed180fe57e60\\\" IfName:\\\"eth0\\\" Args:\\\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=machine-api-operator-6fbb6cf6f9-n8tnn;K8S_POD_INFRA_CONTAINER_ID=a48640ea906a4e679db30d8ed63617d252b5836d193a04691bdbafc25f9a7a5d;K8S_POD_UID=c7f5e6cd-e093-409a-8758-d3db7a7eb32c\\\" Path:\\\"\\\" ERRORED: error configuring pod [openshift-machine-api/machine-api-operator-6fbb6cf6f9-n8tnn] networking: Multus: [openshift-machine-api/machine-api-operator-6fbb6cf6f9-n8tnn/c7f5e6cd-e093-409a-8758-d3db7a7eb32c]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod machine-api-operator-6fbb6cf6f9-n8tnn in out of cluster comm: SetNetworkStatus: failed to update the pod machine-api-operator-6fbb6cf6f9-n8tnn in out of cluster comm: status update failed for pod /: Get \\\"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/machine-api-operator-6fbb6cf6f9-n8tnn?timeout=1m0s\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\n': StdinData: {\\\"binDir\\\":\\\"/var/lib/cni/bin\\\",\\\"clusterNetwork\\\":\\\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\\\",\\\"cniVersion\\\":\\\"0.3.1\\\",\\\"daemonSocketDir\\\":\\\"/run/multus/socket\\\",\\\"globalNamespaces\\\":\\\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\\\",\\\"logLevel\\\":\\\"verbose\\\",\\\"logToStderr\\\":true,\\\"name\\\":\\\"multus-cni-network\\\",\\\"namespaceIsolation\\\":true,\\\"type\\\":\\\"multus-shim\\\"}\"" pod="openshift-machine-api/machine-api-operator-6fbb6cf6f9-n8tnn" podUID="c7f5e6cd-e093-409a-8758-d3db7a7eb32c" Mar 20 08:38:40.554816 master-0 kubenswrapper[7465]: E0320 08:38:40.554732 7465 mirror_client.go:138] "Failed deleting a mirror pod" err="Timeout: request did not complete within requested timeout - context deadline exceeded" pod="openshift-etcd/etcd-master-0-master-0" Mar 20 08:38:40.555463 master-0 kubenswrapper[7465]: E0320 08:38:40.555438 7465 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="34.018s" Mar 20 08:38:42.554591 master-0 kubenswrapper[7465]: E0320 08:38:42.554145 7465 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{router-default-7dcf5569b5-xmvwz.189e7fd50f5861ae openshift-ingress 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-ingress,Name:router-default-7dcf5569b5-xmvwz,UID:91b2899e-8d24-41a0-bec8-d11c67b8f955,APIVersion:v1,ResourceVersion:8055,FieldPath:spec.containers{router},},Reason:Pulled,Message:Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777\" in 28.25s (28.25s including waiting). Image size: 487159945 bytes.,Source:EventSource{Component:kubelet,Host:master-0,},FirstTimestamp:2026-03-20 08:37:36.292766126 +0000 UTC m=+81.936081616,LastTimestamp:2026-03-20 08:37:36.292766126 +0000 UTC m=+81.936081616,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:master-0,}" Mar 20 08:38:46.570961 master-0 kubenswrapper[7465]: E0320 08:38:46.570898 7465 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="6.015s"aggregated/unused_machine_configs_count.json0000640000000000000000000000004215157203636020140 0ustar0000000000000000{"unused_machineconfigs_count":21}config/machineconfigs/rendered-worker-6c41cf327075224fbef5e7f434bc5d69.json0000640000000000000000000004053715157203636024063 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"393b8dc2c216dbbbf68cd1ccde5cbc2b551b2fe8","machineconfiguration.openshift.io/release-image-version":"4.18.35"},"creationTimestamp":"2026-03-20T08:37:12Z","generation":1,"name":"rendered-worker-6c41cf327075224fbef5e7f434bc5d69","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"worker","uid":"71542f53-a8d0-43d8-baf2-58c92b237fee"}],"resourceVersion":"8296","uid":"e330a0f2-a1a5-42e1-ba9f-1f4cd36a5708"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:565e3659fe92dfb59b50fd56206af6cad94bcc286825b798c2cf1a98aa8d0c6f","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/worker,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n --cloud-provider= \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:53d66d524ca3e787d8dbe30dbc4d9b8612c9cebd505ccb4375a8441814e85422 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8a9e8da5c6114f062b814936d4db7a47a04d248e160d6bb28ad4e4a081496ee4 \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"}]}},"extensions":[],"fips":false,"kernelArguments":["systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f5726322e050cdd4c508be51d2c99a3168eb7535ddc5f2a298df3059ea6c0071"}}config/machineconfigs/rendered-master-47246abc0cee5fbe972e47e23f330f37.json0000640000000000000000000004332715157203636024120 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"393b8dc2c216dbbbf68cd1ccde5cbc2b551b2fe8","machineconfiguration.openshift.io/release-image-version":"4.18.35"},"creationTimestamp":"2026-03-20T08:37:12Z","generation":1,"name":"rendered-master-47246abc0cee5fbe972e47e23f330f37","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"master","uid":"dd50c96a-d40c-49d6-9299-cdd3a16c9080"}],"resourceVersion":"8300","uid":"3c8226f3-8d3c-4345-8fd4-7be614ea46db"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:565e3659fe92dfb59b50fd56206af6cad94bcc286825b798c2cf1a98aa8d0c6f","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"disks":[{"device":"/dev/vdc","wipeTable":true},{"device":"/dev/vdd","wipeTable":true},{"device":"/dev/vde","wipeTable":true}],"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/control-plane,node-role.kubernetes.io/master,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --cloud-provider= \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --register-with-taints=node-role.kubernetes.io/master=:NoSchedule \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:53d66d524ca3e787d8dbe30dbc4d9b8612c9cebd505ccb4375a8441814e85422 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8a9e8da5c6114f062b814936d4db7a47a04d248e160d6bb28ad4e4a081496ee4 \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"},{"contents":"# See https://github.com/openshift/machine-config-operator/issues/1897\n[Service]\nNice=10\nIOSchedulingClass=best-effort\nIOSchedulingPriority=6\n","name":"mco-controlplane-nice.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"},{"contents":"[Unit]\nDescription=Run dnsmasq to provide local dns for Single Node OpenShift\nBefore=kubelet.service crio.service\nAfter=network.target ovs-configuration.service\n\n[Service]\nTimeoutStartSec=30\nExecStartPre=/usr/local/bin/dnsmasq_config.sh\nExecStart=/usr/sbin/dnsmasq -k\nRestart=always\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"dnsmasq.service"},{"enabled":true,"name":"iscsid.service"},{"contents":"[Unit]\nDescription=Create logical volume with name cinder-volumes.\nAfter=var.mount systemd-udev-settle.service\n\n[Service]\nType=oneshot\nExecCondition=/bin/bash -c '! /usr/sbin/vgdisplay cinder-volumes'\nExecStartPre=/usr/sbin/pvcreate /dev/vdc /dev/vdd /dev/vde\nExecStart=/usr/sbin/vgcreate cinder-volumes /dev/vdc /dev/vdd /dev/vde\nRemainAfterExit=yes\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"lv-cinder-volumes.service"},{"enabled":true,"name":"multipathd.service"}]}},"extensions":[],"fips":false,"kernelArguments":["net.ifnames=0","systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f5726322e050cdd4c508be51d2c99a3168eb7535ddc5f2a298df3059ea6c0071"}}config/running_containers.json0000640000000000000000000001077115157203636015323 0ustar0000000000000000{"images":{"0":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","1":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","10":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","11":"sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","12":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","13":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","14":"sha256:112a03f2411f871cdaca5f20daef71024dac710113d5f30897117a5a02f6b6f5","15":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","16":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","17":"sha256:ab745a9e15dadc862548ceb5740b8f5d02075232760c6715d82b4c3b70eddca9","18":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","19":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","2":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","20":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","21":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","22":"registry.redhat.io/redhat/certified-operator-index:v4.18","23":"sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe","24":"sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014","25":"sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946","26":"sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","27":"sha256:632e80bba5077068ecca05fddb95aedebad4493af6f36152c01c6ae490975b62","28":"sha256:97c7a635130c574a2c501091bb44f17cd92e05e29b5102e59578b5885d9bfec0","29":"sha256:7c527b4e8239a1f4f4e0a851113e7dd633b7dcb9d75b0e7b21c23d26304abcb3","3":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","30":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","31":"sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","32":"registry.redhat.io/redhat/redhat-operator-index:v4.18","33":"sha256:ea5c8a93f30e0a4932da5697d22c0da7eda9a7035c0555eb006b6755e62bb2fc","34":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","35":"sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","36":"sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777","37":"sha256:7af9f5c5af9d529840233ef4b519120cc0e3f14c4fe28cc43b0823f2c11d8f89","38":"sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","39":"sha256:ce8e3088493b4a72dd766b3b5b4ccb83b7d72d514bbf64063a913dfe961273db","4":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","40":"sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d","41":"sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","42":"sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","43":"sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252","44":"sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739","45":"sha256:cdd28dfe7132e19af9f013f72cf120d970bc31b6b74693af262f8d2e82a096e1","46":"sha256:30a2f97d7785ce8b0ea5115e67c4554b64adefbc7856bcf6f4fe6cc7e938a310","47":"sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","48":"sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12","49":"sha256:1973d56a1097a48ea0ebf2c4dbae1ed86fa67bb0116f4962f7720d48aa337d27","5":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","50":"registry.redhat.io/redhat/community-operator-index:v4.18","51":"sha256:a746a87b784ea1caa278fd0e012554f9df520b6fff665ea0bc4c83f487fed113","52":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","53":"sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e","6":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","7":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","8":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","9":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634"},"containers":{"2026-03":{"0":17,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":2,"17":2,"18":2,"19":2,"2":8,"20":2,"21":2,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":6,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":4,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"49":1,"5":4,"50":1,"51":1,"52":1,"53":1,"6":4,"7":3,"8":3,"9":2}}}config/pod/openshift-network-operator/network-operator-7bd846bfc4-mt454.json0000640000000000000000000002515415157203636025370 0ustar0000000000000000{"metadata":{"name":"network-operator-7bd846bfc4-mt454","generateName":"network-operator-7bd846bfc4-","namespace":"openshift-network-operator","uid":"ad692349-5089-4afc-85b2-9b6e7997567c","resourceVersion":"9074","creationTimestamp":"2026-03-20T08:34:23Z","labels":{"name":"network-operator","pod-template-hash":"7bd846bfc4"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-7bd846bfc4","uid":"1488f96e-7057-45d4-909a-e429b58dec23","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-h6mb5","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:02f0aa65dfd2a58e13248b4e2078caec450fa2bdbacb3afeb34d1de30c909b0f"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:896642a5bdda0cdbeccb0293d3de85f8882ac72678df8d12fb501fd3367982af"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b6140aa21678d5652c4d09e21eab5dfad35af30902b705c70f72a384e43868ac"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da26695a0ab94eddc0841bf2ed51b30921e2cdc2a9a5acd0d951081de67f1a97"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a22978e1669cdbaeee6ec0800f83559b56a2344f1c003f8cd60f27fac939680e"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-h6mb5","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:34:54Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:34:46Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:38:47Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:38:47Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:34:23Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-20T08:34:46Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-03-20T08:38:47Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"apply / update (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0320 08:37:44.524813 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter\nI0320 08:37:44.524871 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0320 08:37:44.524889 1 log.go:245] reconciling (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script\nI0320 08:37:44.524956 1 log.go:245] could not apply (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: failed to apply / update (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: client rate limiter Wait returned an error: context canceled\nI0320 08:37:44.524973 1 log.go:245] reconciling (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter\nI0320 08:37:44.525063 1 log.go:245] could not apply (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: failed to apply / update (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0320 08:37:49.513275 1 observer_polling.go:162] Shutting down file observer\nI0320 08:38:14.514206 1 internal.go:550] \"Stopping and waiting for caches\"\nI0320 08:38:14.514284 1 internal.go:554] \"Stopping and waiting for webhooks\"\nI0320 08:38:14.514294 1 internal.go:557] \"Stopping and waiting for HTTP servers\"\nI0320 08:38:14.514303 1 internal.go:561] \"Wait completed, proceeding to shutdown the manager\"\nF0320 08:38:14.514227 1 operator.go:133] Failed to start controller-runtime manager: failed waiting for all runnables to end within grace period of 30s: context deadline exceeded\n","startedAt":"2026-03-20T08:34:53Z","finishedAt":"2026-03-20T08:38:14Z","containerID":"cri-o://871b2216305e9883e9345351545dfa140768d0b1a9975612361ac0d841fda34c"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","containerID":"cri-o://b10e547edcdc3314e5e478ee6b910f608083e53cf3a4277550ec5bfade59f20f","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-h6mb5","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-6t5vb.json0000640000000000000000000002461115157203636025645 0ustar0000000000000000{"metadata":{"name":"network-node-identity-6t5vb","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"fb0fc10f-5796-4cd5-b8f5-72d678054c24","resourceVersion":"9067","creationTimestamp":"2026-03-20T08:35:24Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"5d8cf8bd5d","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"775bfd3d-5152-4f74-a5d5-e9df0a7f9df9","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-lh47j","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-lh47j","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-lh47j","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:35:45Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:35:24Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:38:46Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:38:46Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:35:24Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-20T08:35:24Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-03-20T08:38:40Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"t\",\"name\":\"csr-qpzlb\"} reason=\"CSRApproved\"\nI0320 08:36:02.538124 1 approver.go:230] Finished syncing CSR csr-qpzlb for master-0 node in 6.531071ms\nI0320 08:36:02.538327 1 approver.go:230] Finished syncing CSR csr-qpzlb for unknown node in 84.873µs\nI0320 08:36:02.548460 1 approver.go:230] Finished syncing CSR csr-qpzlb for unknown node in 62.832µs\nE0320 08:38:00.606750 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path\nE0320 08:38:15.607635 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nE0320 08:38:15.607780 1 leaderelection.go:429] Failed to update lock optimistically: client rate limiter Wait returned an error: rate: Wait(n=1) would exceed context deadline, falling back to slow path\nE0320 08:38:15.607809 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: client rate limiter Wait returned an error: context deadline exceeded\nI0320 08:38:15.607829 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0320 08:38:30.608435 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0320 08:38:30.608593 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2026-03-20T08:35:44Z","finishedAt":"2026-03-20T08:38:30Z","containerID":"cri-o://11fb9901a3c95280d4ada671324191ca15e473462e8fdb0e196a3a680e2d44a1"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","containerID":"cri-o://b38f5242ee8fec0a4fb77638e3088bf483c8bc44e65e9e4b954af76f0ae77a90","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-lh47j","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-03-20T08:35:44Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","containerID":"cri-o://2530070030abd272dac9151bcbdcdd74c4a2472ddf19cb97a57dadd8614ece94","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-lh47j","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-66b84d69b-gzg9m.json0000640000000000000000000002432115157203636025266 0ustar0000000000000000{"metadata":{"name":"ingress-operator-66b84d69b-gzg9m","generateName":"ingress-operator-66b84d69b-","namespace":"openshift-ingress-operator","uid":"ea47ffd1-47ce-4f28-b0a8-3b932a2e3a02","resourceVersion":"9078","creationTimestamp":"2026-03-20T08:34:25Z","labels":{"name":"ingress-operator","pod-template-hash":"66b84d69b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.26/23\"],\"mac_address\":\"0a:58:0a:80:00:1a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.26/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.26\"\n ],\n \"mac\": \"0a:58:0a:80:00:1a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-66b84d69b","uid":"a44f9ffa-c267-4a55-9c7c-ed1e57ed02ce","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-8d57k","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-8d57k","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-8d57k","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:42Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:07Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:38:47Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:38:47Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.26","podIPs":[{"ip":"10.128.0.26"}],"startTime":"2026-03-20T08:36:07Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-03-20T08:38:47Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0320 08:38:42.364509 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.RoleBinding ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-20T08:38:42.364Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for webhooks\n2026-03-20T08:38:42.365Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for HTTP servers\nW0320 08:38:42.364555 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.FeatureGate ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-20T08:38:42.365Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\n2026-03-20T08:38:42.365Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\nW0320 08:38:42.364767 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DaemonSet ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0320 08:38:42.365448 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Deployment ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-20T08:38:42.369Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"failed to wait for canary_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}\n2026-03-20T08:38:42.369Z\tINFO\toperator.main\truntime/asm_amd64.s:1695\tfile watch events channel closed\n","startedAt":"2026-03-20T08:36:41Z","finishedAt":"2026-03-20T08:38:42Z","containerID":"cri-o://0c7a85a881c1e6ccd13a87741cbb2be0fd8a4f88ff19bd0cb0941e6a43061f79"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","containerID":"cri-o://32acfc021b8f8071fac0cc1a8b0129efcea8236c65c56620ec15567dda3b37db","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-8d57k","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-20T08:36:41Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://afe5be40b772a3679b289a32d738409fbbd0267f6b546d1fa3b047d53cf456bb","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-8d57k","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-olm-operator/cluster-olm-operator-67dcd4998-c5742.json0000640000000000000000000002540615157203636026401 0ustar0000000000000000{"metadata":{"name":"cluster-olm-operator-67dcd4998-c5742","generateName":"cluster-olm-operator-67dcd4998-","namespace":"openshift-cluster-olm-operator","uid":"86cb5d23-df7f-4f67-8086-1789d8e68544","resourceVersion":"5290","creationTimestamp":"2026-03-20T08:34:23Z","labels":{"name":"cluster-olm-operator","pod-template-hash":"67dcd4998"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.6/23\"],\"mac_address\":\"0a:58:0a:80:00:06\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.6/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.6\"\n ],\n \"mac\": \"0a:58:0a:80:00:06\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-olm-operator-67dcd4998","uid":"73a557d4-24a1-47a9-9faa-490060ddbd6a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cluster-olm-operator-serving-cert","secret":{"secretName":"cluster-olm-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"operand-assets","emptyDir":{}},{"name":"kube-api-access-j7k8m","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"copy-catalogd-manifests","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","command":["/bin/sh"],"args":["-c","cp -a /openshift/manifests /operand-assets/catalogd"],"resources":{},"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-j7k8m","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000370000,"allowPrivilegeEscalation":false}},{"name":"copy-operator-controller-manifests","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","command":["/bin/sh"],"args":["-c","cp -a /openshift/manifests /operand-assets/operator-controller"],"resources":{},"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-j7k8m","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000370000,"allowPrivilegeEscalation":false}}],"containers":[{"name":"cluster-olm-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","command":["/cluster-olm-operator"],"args":["start"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"OPERATOR_NAME","value":"cluster-olm-operator"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed"},{"name":"CATALOGD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85"},{"name":"OPERATOR_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"cluster-olm-operator-serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-j7k8m","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000370000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-olm-operator","serviceAccount":"cluster-olm-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c19,c14"},"runAsNonRoot":true,"fsGroup":1000370000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:15Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:25Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:31Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:31Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:36:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.6","podIPs":[{"ip":"10.128.0.6"}],"startTime":"2026-03-20T08:36:06Z","initContainerStatuses":[{"name":"copy-catalogd-manifests","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-20T08:36:19Z","finishedAt":"2026-03-20T08:36:19Z","containerID":"cri-o://eb336787da69f3659db83e9b59377f619a1bab475c9f6f4fe67e34d16e998717"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","containerID":"cri-o://eb336787da69f3659db83e9b59377f619a1bab475c9f6f4fe67e34d16e998717","started":false,"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-j7k8m","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"copy-operator-controller-manifests","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-20T08:36:24Z","finishedAt":"2026-03-20T08:36:24Z","containerID":"cri-o://e5ff2b8e0eaf0ec4027bec63b2223736cf7655c761ce84b8c07f00889c293502"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","containerID":"cri-o://e5ff2b8e0eaf0ec4027bec63b2223736cf7655c761ce84b8c07f00889c293502","started":false,"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-j7k8m","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"cluster-olm-operator","state":{"running":{"startedAt":"2026-03-20T08:36:30Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"W0320 08:36:28.669688 1 cmd.go:254] Using insecure, self-signed certificates\nI0320 08:36:28.922555 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0320 08:36:28.923375 1 observer_polling.go:159] Starting file observer\nI0320 08:36:28.923661 1 observer_polling.go:120] Observed file \"/var/run/secrets/serving-cert/tls.crt\" has been modified (old=\"\", new=\"dd0a4afceef1efcfe56cafe21f04ee9c40b4d62e4b4a0ac4dec8e278fee10230\")\nW0320 08:36:28.923726 1 builder.go:154] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was modified\nI0320 08:36:28.923801 1 observer_polling.go:120] Observed file \"/var/run/secrets/serving-cert/tls.key\" has been modified (old=\"\", new=\"75b5ab0ee6d8a57b60f9dd3caadc26e2307128e2d5ab6bbd9077c34557585a67\")\nW0320 08:36:28.923930 1 builder.go:266] unable to get owner reference (falling back to namespace): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-cluster-olm-operator/pods\": context canceled\nI0320 08:36:28.924106 1 builder.go:298] cluster-olm-operator version 4.18.0-202602261953.p2.g88088e4.assembly.stream.el9-88088e4-88088e4bfe9f55ea7ab2c4331cebee727c8c0c34\nF0320 08:36:29.222930 1 cmd.go:179] failed checking apiserver connectivity: client rate limiter Wait returned an error: context canceled\n","startedAt":"2026-03-20T08:36:28Z","finishedAt":"2026-03-20T08:36:29Z","containerID":"cri-o://aba047bf62fdafe49170c75e4151358bb7421fff8f12793b7c505a061479cedc"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","containerID":"cri-o://517434b092860d80f200ad453a8ab960ca389e8d7a3ffc04820cc51b48ee30fe","started":true,"volumeMounts":[{"name":"cluster-olm-operator-serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-j7k8m","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/clusteroperator/storage.json0000640000000000000000000000346615157203636016322 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"e60a9aec-3c21-43ae-b44e-9081ed135920","resourceVersion":"5391","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:36:32Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:36:32Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:36:32Z","reason":"AsExpected","message":"DefaultStorageClassControllerAvailable: No default StorageClass for this platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:36:32Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-20T08:36:31Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315157203636016666 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"15901a08-ab07-4354-aa72-52ae6f087046","resourceVersion":"4948","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:36:26Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:36:22Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:36:22Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000252415157203636024670 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"95d553db-34af-4d2a-8671-5f5058336136","resourceVersion":"7817","generation":1,"creationTimestamp":"2026-03-20T08:30:21Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:37:04Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-20T08:37:04Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-20T08:37:04Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:37:04Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000240715157203636023460 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"01ca6055-67bc-4969-ae7c-3edf9ab59f19","resourceVersion":"9094","generation":1,"creationTimestamp":"2026-03-20T08:30:21Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:37:04Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:37:34Z","message":"Deployed 4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:37:04Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:37:04Z"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115157203636022050 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"116c8d04-d0fa-4bae-b847-2267491f773d","resourceVersion":"7718","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:37:04Z","message":"Deployed 4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:37:04Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:37:04Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:37:04Z"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315157203636020312 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"cb280aa2-cafc-42fb-b723-34c5c858f375","resourceVersion":"820","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000430415157203636022436 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"beb1b8f4-07cb-4472-bcf6-3079fa4885fa","resourceVersion":"8443","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-20T08:36:25Z","reason":"_DesiredStateNotYetAchieved","message":"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\nProgressing: deployment/route-controller-manager: observed generation is 4, desired generation is 5.\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-20T08:36:25Z","reason":"_NoPodsAvailable","message":"Available: no pods available on any node."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:36:25Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215157203636020644 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"6695233c-0d37-4c04-ab1f-8c9c46ddeb0b","resourceVersion":"8246","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:36:23Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:37:09Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-20T08:36:24Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:36:22Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-20T08:36:21Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"openshift-apiserver","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420415157203636015435 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"5af4dc47-c7c6-4850-8926-5a8c6f0595e4","resourceVersion":"9102","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:36:31Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:36:58Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:36:58Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:36:31Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-20T08:36:31Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115157203636017074 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"c7c64074-699b-4131-a1cd-05da30f8793d","resourceVersion":"6369","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:36:42Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.35\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:36:44Z","reason":"AsExpected","message":"Cluster version is \"4.18.35\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:36:41Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.35"},{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003615415157203636016347 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"de1e1633-7493-430a-89be-40c69bb72fd6","resourceVersion":"7852","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-03-20T08:35:06Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:34:55Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:34:55Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:37:05Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:36:17Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-flatfile-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715157203636017040 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"7c743f19-4434-48f3-9f34-23f53eefe1fb","resourceVersion":"7609","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-03-20T08:37:03Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-03-20T08:37:03Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-20T08:37:03Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:37:03Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315157203636017135 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"b326b560-03bb-4893-9394-04bcfd8a3aed","resourceVersion":"7721","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:37:04Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.35"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:37:04Z","reason":"OperatorAvailable","message":"Available release version: 4.18.35"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:37:04Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:37:04Z","reason":"OperatorAvailable","message":"Available release version: 4.18.35"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000573615157203636017527 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"4f114142-6d5c-483e-b724-5418921f72cc","resourceVersion":"9092","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:37:23Z","message":"Error while reconciling 4.18.35"},{"type":"Degraded","status":"True","lastTransitionTime":"2026-03-20T08:38:50Z","reason":"MachineConfigControllerFailed","message":"Failed to resync 4.18.35 because: Could not make kubeconfig-data CM, configmaps \"kubeconfig-data\" already exists"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:37:23Z","reason":"AsExpected","message":"Cluster has deployed [{operator 4.18.35} {operator-image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015}]"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:37:23Z","reason":"AsExpected"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-20T08:37:23Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"operator-image","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"operator.openshift.io","resource":"machineconfigurations","name":""},{"group":"","resource":"nodes","name":""},{"group":"","resource":"namespaces","name":"openshift-kni-infra"},{"group":"","resource":"namespaces","name":"openshift-openstack-infra"},{"group":"","resource":"namespaces","name":"openshift-ovirt-infra"},{"group":"","resource":"namespaces","name":"openshift-vsphere-infra"},{"group":"","resource":"namespaces","name":"openshift-nutanix-infra"},{"group":"","resource":"namespaces","name":"openshift-cloud-platform-infra"}],"extension":{"master":"all 1 nodes are at latest configuration rendered-master-47246abc0cee5fbe972e47e23f330f37","worker":"all 0 nodes are at latest configuration rendered-worker-6c41cf327075224fbef5e7f434bc5d69"}}}config/clusteroperator/machine-approver.json0000640000000000000000000000253215157203636020107 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"d662e58c-f718-4649-8ccf-b47cf58fcfe2","resourceVersion":"9096","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:38:51Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.35"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:38:51Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:38:51Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:38:51Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000263415157203636017025 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"9a70872c-a229-401c-98c3-7f5a66053b7c","resourceVersion":"743","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","name":""},{"group":"machine.openshift.io","resource":"machinesets","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddresses","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddressclaims","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315157203636022545 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"c8ac6ab9-9d2c-42ba-9b81-84c5a116d30c","resourceVersion":"4844","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:36:25Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:36:25Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:36:19Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-20T08:36:19Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615157203636017555 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"7c324218-efc0-493c-b2f2-f2736e74fe55","resourceVersion":"9135","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:36:42Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-20T08:36:58Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-20T08:36:42Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:36:42Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-20T08:36:42Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715157203636021376 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"770cf8ac-68d7-46d2-853a-fd4c7fe6e64f","resourceVersion":"8316","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:36:21Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-20T08:36:57Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-20T08:36:21Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:36:21Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715157203636017603 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"4957534d-8afe-4573-b743-b2614a05ee9c","resourceVersion":"7822","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:36:10Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-20T08:37:04Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-20T08:36:11Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:36:10Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-20T08:36:10Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000141415157203636016475 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"431873ac-c39a-4e3c-8264-3041093c8432","resourceVersion":"829","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/ingress.json0000640000000000000000000000456715157203636016333 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"660b79dc-ea05-4cd6-bc05-08459014fe53","resourceVersion":"6340","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:36:43Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-20T08:36:42Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:36:43Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:36:42Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-20T08:36:42Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715157203636017600 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"c15a0a1c-0bdf-44a3-aab7-fc83a87e1999","resourceVersion":"827","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015157203636015572 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"9dc9166f-aea7-46aa-90a5-908989dd29e7","resourceVersion":"6957","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:36:31Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-20T08:36:54Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-20T08:36:33Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:36:31Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-20T08:36:31Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515157203636015442 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"ca0ffeea-9436-4105-bfc4-d4ac57a8609a","resourceVersion":"8022","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:37:07Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:36:42Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:37:07Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:36:42Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed"},{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715157203636021444 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"f7742962-fc25-4b68-9622-23b728bc2305","resourceVersion":"4839","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:36:25Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:36:25Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"csi-snapshot-controller","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000154215157203636021617 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"40eb50c6-b443-47e5-85a2-79a40e793d43","resourceVersion":"726","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215157203636016304 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"074a6c15-ddbd-4eea-a414-d61da489b704","resourceVersion":"836","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615157203636017744 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"c360a5db-de76-4d3c-ae43-304a52d5e000","resourceVersion":"4881","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:36:26Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:36:26Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:36:26Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:36:26Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-20T08:36:26Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.35"},{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000164415157203636020473 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"8a0cb430-3c1c-4a2f-8cc5-0f41ebe292df","resourceVersion":"840","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","name":""},{"group":"autoscaling.openshift.io","resource":"machineautoscalers","name":""}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000000346515157203636020073 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"bac2d17e-fa46-4749-8286-453001958374","resourceVersion":"825","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"pod-identity-webhook"},{"group":"apps","resource":"deployments","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","name":""},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"","resource":"serviceaccounts","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"","resource":"services","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"pod-identity-webhook"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000440115157203636021543 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"9550edbc-b566-46c2-9595-10a08bbc13ae","resourceVersion":"9104","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"TrustedCABundleControllerControllerAvailable","status":"True","lastTransitionTime":"2026-03-20T08:38:50Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"TrustedCABundleControllerControllerDegraded","status":"False","lastTransitionTime":"2026-03-20T08:38:50Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"CloudConfigControllerAvailable","status":"True","lastTransitionTime":"2026-03-20T08:38:51Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"CloudConfigControllerDegraded","status":"False","lastTransitionTime":"2026-03-20T08:38:51Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:38:51Z","reason":"AsExpected","message":"Cluster Cloud Controller Manager Operator is available at 4.18.35"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:38:51Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:38:51Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:38:51Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"},{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427015157203636016604 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"14566c8c-b055-4ed3-b0ed-89eafb2eaef5","resourceVersion":"7564","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:37:03Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:37:03Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:37:03Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:37:03Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-20T08:37:03Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000730715157203636017673 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"3b5683d1-dd06-410b-ac99-d4ff24495fe1","resourceVersion":"8269","generation":1,"creationTimestamp":"2026-03-20T08:30:20Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"AsExpected","message":"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-20T08:37:11Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.89.113:443/healthz\": dial tcp 172.30.89.113:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"oauth-apiserver","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}aggregated/ingress_controllers_certs.json0000640000000000000000000000045715157203636017543 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-03-20T08:36:41Z","not_after":"2028-03-19T08:36:42Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-03-20T08:36:42Z","not_after":"2028-03-19T08:36:43Z","controllers":[]}]config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315157203636023452 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"6e441b18-c520-4560-9d8e-d09ad085f85e","resourceVersion":"4292","generation":1,"creationTimestamp":"2026-03-20T08:36:20Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015157203636022055 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"734a7468-e56f-4bae-afd6-d9cf8b079d9a","resourceVersion":"4273","generation":1,"creationTimestamp":"2026-03-20T08:36:20Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-20T08:36:20Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515157203636023225 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115157203636025435 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715157203636025144 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715157203636025135 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315157203636022255 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515157203636026711 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115157203636023414 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115157203636023210 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115157203636025500 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/pod/openshift-cluster-version/cluster-version-operator-7d58488df-qmm8h.json0000640000000000000000000001341415157203636026626 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-7d58488df-qmm8h","generateName":"cluster-version-operator-7d58488df-","namespace":"openshift-cluster-version","uid":"1375da42-ecaf-4d86-b554-25fd1c3d00bd","resourceVersion":"7905","creationTimestamp":"2026-03-20T08:37:02Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"7d58488df"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-7d58488df","uid":"b7be1bfe-0a4a-4757-8a9c-8cce40f2ab25","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:37:05Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:37:02Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:37:05Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:37:05Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-20T08:37:02Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-20T08:37:02Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-03-20T08:37:05Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","containerID":"cri-o://ef48bc7a298f21dc7e1c4f0e8ec7b05b2de65f0d7e2d6a14897ed741dcf440bd","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415157203636011032 0ustar00000000000000007ec9f43c-14e4-49f9-b03f-4ab21bfcdf55config/version.json0000640000000000000000000000722015157203636013076 0ustar0000000000000000{"metadata":{"name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","resourceVersion":"8808","generation":2,"creationTimestamp":"2026-03-20T08:29:46Z"},"spec":{"clusterID":"7ec9f43c-14e4-49f9-b03f-4ab21bfcdf55","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.35","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","url":"https://access.redhat.com/errata/RHSA-2026:3905","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","fast-4.19","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-03-20T08:30:20Z","completionTime":null,"version":"4.18.35","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","verified":false}],"observedGeneration":2,"versionHash":"Uw6h6T7stl0=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-03-20T08:30:20Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-03-20T08:30:20Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-03-20T08:30:20Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-03-20T08:30:20Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-03-20T08:30:20Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-03-20T08:38:13Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, cloud-controller-manager, cloud-credential, cluster-autoscaler, control-plane-machine-set, etcd, image-registry, insights, kube-apiserver, kube-controller-manager, kube-scheduler, machine-api, machine-approver, monitoring, openshift-apiserver, openshift-controller-manager, openshift-samples, operator-lifecycle-manager-packageserver are not available\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 908): the server is down or not responding\n* Could not update oauthclient \"console\" (550 of 908): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (825 of 908): resource may have been deleted\n* Could not update role \"openshift-console/prometheus-k8s\" (829 of 908): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-20T08:30:20Z","reason":"MultipleErrors","message":"Unable to apply 4.18.35: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215157203636020204 0ustar0000000000000000[]config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115157203636025304 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"2ff327da-1910-4454-a557-6ca23e731c58","resourceVersion":"4897","generation":2,"creationTimestamp":"2026-03-20T08:30:46Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515157203636026743 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"5d83e13b-e705-4a77-993c-ef73871bf972","resourceVersion":"7371","generation":1,"creationTimestamp":"2026-03-20T08:36:59Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"f3437cbd-3241-4219-9ef3-5788faecde6f","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715157203636024031 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"154f91ed-612f-4ff7-a2f7-7ac43eed03d8","resourceVersion":"4896","generation":2,"creationTimestamp":"2026-03-20T08:35:09Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"f3437cbd-3241-4219-9ef3-5788faecde6f","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500115157203636032114 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"1fe999cf-1e27-4dac-9392-5166120baea9","resourceVersion":"7569","generation":2,"creationTimestamp":"2026-03-20T08:37:03Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002215615157203635025507 0ustar0000000000000000{"metadata":{"name":"edit","uid":"06ecfc09-cd83-4988-af0c-52f93ac1b9f0","resourceVersion":"7111","creationTimestamp":"2026-03-20T08:28:29Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002504315157203635025650 0ustar0000000000000000{"metadata":{"name":"admin","uid":"4eff9455-96d5-4a84-bc56-af2860677f44","resourceVersion":"7115","creationTimestamp":"2026-03-20T08:28:29Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}events/openshift-machine-api.json0000640000000000000000000002067115157203635015624 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-20T08:30:53Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-baremetal-operator-6f69995874-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-20T08:34:22Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-baremetal-operator-6f69995874-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-20T08:34:25Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-20T08:36:10Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : secret \"cluster-baremetal-webhook-server-cert\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-20T08:36:10Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : secret \"cluster-baremetal-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-20T08:36:31Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : secret \"cluster-baremetal-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-20T08:36:31Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : secret \"cluster-baremetal-webhook-server-cert\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-20T08:38:39Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_cluster-autoscaler-operator-866dc4744-xwxg7_openshift-machine-api_21bebade-17fa-444e-92a9-eea53d6cd673_0(eea5c777fab069276340fb8b8e8bc932a48b37c137af14866a4f948ceb435c50): error adding pod openshift-machine-api_cluster-autoscaler-operator-866dc4744-xwxg7 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"eea5c777fab069276340fb8b8e8bc932a48b37c137af14866a4f948ceb435c50\" Netns:\"/var/run/netns/cf3886d6-d600-4c57-baf9-25c23fb5edd0\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=cluster-autoscaler-operator-866dc4744-xwxg7;K8S_POD_INFRA_CONTAINER_ID=eea5c777fab069276340fb8b8e8bc932a48b37c137af14866a4f948ceb435c50;K8S_POD_UID=21bebade-17fa-444e-92a9-eea53d6cd673\" Path:\"\" ERRORED: error configuring pod [openshift-machine-api/cluster-autoscaler-operator-866dc4744-xwxg7] networking: Multus: [openshift-machine-api/cluster-autoscaler-operator-866dc4744-xwxg7/21bebade-17fa-444e-92a9-eea53d6cd673]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod cluster-autoscaler-operator-866dc4744-xwxg7 in out of cluster comm: SetNetworkStatus: failed to update the pod cluster-autoscaler-operator-866dc4744-xwxg7 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/cluster-autoscaler-operator-866dc4744-xwxg7?timeout=1m0s\": context deadline exceeded\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-20T08:38:39Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_control-plane-machine-set-operator-6f97756bc8-7t5qv_openshift-machine-api_e9e912c1-a2d4-4d78-98c1-ea3b232ddd7e_0(9dbc34ec166af95a7853428b41cee350fe85c8c54be4aa6e328035aa02204cfc): error adding pod openshift-machine-api_control-plane-machine-set-operator-6f97756bc8-7t5qv to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"9dbc34ec166af95a7853428b41cee350fe85c8c54be4aa6e328035aa02204cfc\" Netns:\"/var/run/netns/528b4df4-56d0-4831-a96c-32b3710c2f88\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=control-plane-machine-set-operator-6f97756bc8-7t5qv;K8S_POD_INFRA_CONTAINER_ID=9dbc34ec166af95a7853428b41cee350fe85c8c54be4aa6e328035aa02204cfc;K8S_POD_UID=e9e912c1-a2d4-4d78-98c1-ea3b232ddd7e\" Path:\"\" ERRORED: error configuring pod [openshift-machine-api/control-plane-machine-set-operator-6f97756bc8-7t5qv] networking: Multus: [openshift-machine-api/control-plane-machine-set-operator-6f97756bc8-7t5qv/e9e912c1-a2d4-4d78-98c1-ea3b232ddd7e]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod control-plane-machine-set-operator-6f97756bc8-7t5qv in out of cluster comm: SetNetworkStatus: failed to update the pod control-plane-machine-set-operator-6f97756bc8-7t5qv in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/control-plane-machine-set-operator-6f97756bc8-7t5qv?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-20T08:38:39Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_machine-api-operator-6fbb6cf6f9-n8tnn_openshift-machine-api_c7f5e6cd-e093-409a-8758-d3db7a7eb32c_0(a48640ea906a4e679db30d8ed63617d252b5836d193a04691bdbafc25f9a7a5d): error adding pod openshift-machine-api_machine-api-operator-6fbb6cf6f9-n8tnn to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"a48640ea906a4e679db30d8ed63617d252b5836d193a04691bdbafc25f9a7a5d\" Netns:\"/var/run/netns/60ecd76f-554b-4846-9272-ed180fe57e60\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=machine-api-operator-6fbb6cf6f9-n8tnn;K8S_POD_INFRA_CONTAINER_ID=a48640ea906a4e679db30d8ed63617d252b5836d193a04691bdbafc25f9a7a5d;K8S_POD_UID=c7f5e6cd-e093-409a-8758-d3db7a7eb32c\" Path:\"\" ERRORED: error configuring pod [openshift-machine-api/machine-api-operator-6fbb6cf6f9-n8tnn] networking: Multus: [openshift-machine-api/machine-api-operator-6fbb6cf6f9-n8tnn/c7f5e6cd-e093-409a-8758-d3db7a7eb32c]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod machine-api-operator-6fbb6cf6f9-n8tnn in out of cluster comm: SetNetworkStatus: failed to update the pod machine-api-operator-6fbb6cf6f9-n8tnn in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/machine-api-operator-6fbb6cf6f9-n8tnn?timeout=1m0s\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"}]}config/machineconfigpools/worker.json0000640000000000000000000001013415157203635016566 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-20T08:36:51Z","generation":3,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"8393","uid":"71542f53-a8d0-43d8-baf2-58c92b237fee"},"spec":{"configuration":{"name":"rendered-worker-6c41cf327075224fbef5e7f434bc5d69","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-17T08:18:48Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-21T08:25:35Z","subject":"CN=kube-csr-signer_@1773995783"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-21T08:25:35Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-20T08:25:35Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-20T08:25:35Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-17T08:25:32Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-20T08:36:11Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1773995771"}],"conditions":[{"lastTransitionTime":"2026-03-20T08:37:14Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-03-20T08:37:20Z","message":"All nodes are updated with MachineConfig rendered-worker-6c41cf327075224fbef5e7f434bc5d69","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2026-03-20T08:37:20Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-03-20T08:37:20Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-03-20T08:37:20Z","message":"","reason":"","status":"False","type":"Degraded"}],"configuration":{"name":"rendered-worker-6c41cf327075224fbef5e7f434bc5d69","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"degradedMachineCount":0,"machineCount":0,"observedGeneration":3,"readyMachineCount":0,"unavailableMachineCount":0,"updatedMachineCount":0}}config/machineconfigpools/master.json0000640000000000000000000001240715157203635016555 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-20T08:36:51Z","generation":3,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"8431","uid":"dd50c96a-d40c-49d6-9299-cdd3a16c9080"},"spec":{"configuration":{"name":"rendered-master-47246abc0cee5fbe972e47e23f330f37","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-17T08:18:48Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-21T08:25:35Z","subject":"CN=kube-csr-signer_@1773995783"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-21T08:25:35Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-20T08:25:35Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-20T08:25:35Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-17T08:25:32Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-20T08:36:11Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1773995771"}],"conditions":[{"lastTransitionTime":"2026-03-20T08:37:14Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-03-20T08:37:20Z","message":"All nodes are updated with MachineConfig rendered-master-47246abc0cee5fbe972e47e23f330f37","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2026-03-20T08:37:20Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-03-20T08:37:20Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-03-20T08:37:20Z","message":"","reason":"","status":"False","type":"Degraded"}],"configuration":{"name":"rendered-master-47246abc0cee5fbe972e47e23f330f37","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"degradedMachineCount":0,"machineCount":1,"observedGeneration":3,"readyMachineCount":1,"unavailableMachineCount":0,"updatedMachineCount":1}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115157203635027755 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"3fac0498-6610-42d6-941a-a2c51244e556","resourceVersion":"6139","generation":1,"creationTimestamp":"2026-03-20T08:36:41Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-20T08:36:42Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-03-20T08:36:42Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-03-20T08:36:42Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-20T08:36:42Z","reason":"AsExpected"}]}}config/infrastructure.json0000640000000000000000000000106515157203635014471 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"0622daf9-5bcc-4923-8be0-0472098f88e7","resourceVersion":"540","generation":1,"creationTimestamp":"2026-03-20T08:29:40Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/schedulers/cluster.json0000640000000000000000000000052415157203635015232 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"d45c66a8-b813-4e05-9cb5-90dfad52385b","resourceVersion":"564","generation":1,"creationTimestamp":"2026-03-20T08:29:43Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/node/master-0.json0000640000000000000000000000676115157203635013776 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"7bc50120-3879-4454-8162-ec2f348aada5","resourceVersion":"9117","creationTimestamp":"2026-03-20T08:34:23Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node-role.kubernetes.io/worker":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/zone-name":"","machineconfiguration.openshift.io/controlPlaneTopology":"SingleReplica","machineconfiguration.openshift.io/currentConfig":"rendered-master-47246abc0cee5fbe972e47e23f330f37","machineconfiguration.openshift.io/desiredConfig":"rendered-master-47246abc0cee5fbe972e47e23f330f37","machineconfiguration.openshift.io/desiredDrain":"uncordon-rendered-master-47246abc0cee5fbe972e47e23f330f37","machineconfiguration.openshift.io/lastAppliedDrain":"uncordon-rendered-master-47246abc0cee5fbe972e47e23f330f37","machineconfiguration.openshift.io/lastObservedServerCAAnnotation":"false","machineconfiguration.openshift.io/lastSyncedControllerConfigResourceVersion":"8707","machineconfiguration.openshift.io/reason":"","machineconfiguration.openshift.io/state":"Done","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{},"status":{"capacity":{"cpu":"12","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"32865360Ki","pods":"250"},"allocatable":{"cpu":"11500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"31714384Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-03-20T08:38:47Z","lastTransitionTime":"2026-03-20T08:34:23Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-03-20T08:38:47Z","lastTransitionTime":"2026-03-20T08:34:23Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-03-20T08:38:47Z","lastTransitionTime":"2026-03-20T08:34:23Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-03-20T08:38:47Z","lastTransitionTime":"2026-03-20T08:36:06Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.113.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202603021444-0","containerRuntimeVersion":"cri-o://1.31.13-8.rhaos4.18.gitd78977c.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}config/oauth.json0000640000000000000000000000114415157203635012527 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"1053387c-4b85-4c34-b542-9c3abe2b6cd0","resourceVersion":"1632","generation":1,"creationTimestamp":"2026-03-20T08:30:38Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/proxy.json0000640000000000000000000000031315157203635012565 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"86f68d1c-ffeb-4a6c-9d85-51ba997c9ed7","resourceVersion":"557","generation":1,"creationTimestamp":"2026-03-20T08:29:42Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/network.json0000640000000000000000000000117015157203635013077 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"b1b050e0-812c-4891-9ac8-2e598e9db88c","resourceVersion":"3331","generation":2,"creationTimestamp":"2026-03-20T08:29:41Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/ingress.json0000640000000000000000000000043615157203635013064 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"54dec6ea-61fb-40a7-8342-7affd44dabb9","resourceVersion":"554","generation":1,"creationTimestamp":"2026-03-20T08:29:41Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173515157203635025127 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"a2b43264-a74c-42ab-b7bb-5f05ee4a8ddc","resourceVersion":"8273","generation":1,"creationTimestamp":"2026-03-20T08:30:38Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-03-20T08:37:11Z","reason":"SufficientPods","message":""}]}}config/authentication.json0000640000000000000000000000116515157203635014431 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"e677b511-f6e9-474e-8f1e-5a28ece49a50","resourceVersion":"1107","generation":1,"creationTimestamp":"2026-03-20T08:30:26Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646"}]},"spec":{"type":"","oauthMetadata":{"name":""},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615157203635027505 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"efce06c7-3e39-4f10-938c-e5570b22ef16","resourceVersion":"5711","generation":2,"creationTimestamp":"2026-03-20T08:36:37Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/apiserver.json0000640000000000000000000000121615157203635013407 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"7ec2efdf-fb28-4dde-9022-ffaa13c5a742","resourceVersion":"857","generation":1,"creationTimestamp":"2026-03-20T08:30:21Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"23346842-52df-4671-b8a1-beabe3850646"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/featuregate.json0000640000000000000000000000613615157203635013711 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"5b22cd0a-42a6-4491-8234-c64f33c45ec6","resourceVersion":"649","generation":1,"creationTimestamp":"2026-03-20T08:30:02Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.35","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}