insights-operator/gathers.json0000640000000000000000000004413715154764732015300 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/openstack_version","duration_in_ms":11,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":8,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":75,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":88,"records_count":10,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":5824,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":6,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":121,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":23115,"records_count":84,"errors":["the record with the same name \"config/pod/openshift-catalogd/catalogd-controller-manager-7f8b8b6f4c-f46qd.json\" was already recorded and had the fingerprint \"3d39b569e1181373e2200d17fc0de11215f1e7b54241fefb9e12008d37a46260\", overwriting with the record having fingerprint \"3d39b569e1181373e2200d17fc0de11215f1e7b54241fefb9e12008d37a46260\"","the record with the same name \"config/pod/openshift-operator-controller/operator-controller-controller-manager-6598bfb6c4-bg6zf.json\" was already recorded and had the fingerprint \"26b694f01b4d852a5927420e3d7b51b98554b841f0b5df56d72639c965dfd544\", overwriting with the record having fingerprint \"26b694f01b4d852a5927420e3d7b51b98554b841f0b5df56d72639c965dfd544\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-df8wr.json\" was already recorded and had the fingerprint \"139cca6417027560975e57795d5aad2f5b242ad8cbd0e3733fe3b9c1310c7085\", overwriting with the record having fingerprint \"139cca6417027560975e57795d5aad2f5b242ad8cbd0e3733fe3b9c1310c7085\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-df8wr/etcd-operator_previous.log\" was already recorded and had the fingerprint \"747df0f66c73fb690868282bcf217359ec82f9001ce9ed88f2689e4f27706251\", overwriting with the record having fingerprint \"747df0f66c73fb690868282bcf217359ec82f9001ce9ed88f2689e4f27706251\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-df8wr/etcd-operator_current.log\" was already recorded and had the fingerprint \"04d51f50420c07e278d307da8e49eb2f2173ff03b1f821487bff6348b28474ab\", overwriting with the record having fingerprint \"04d51f50420c07e278d307da8e49eb2f2173ff03b1f821487bff6348b28474ab\"","the record with the same name \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-8565d84698-nsg74.json\" was already recorded and had the fingerprint \"16ceecfdee4e3dd1113274b5b2da74ba8866bd9351efaa21db08af8395185d22\", overwriting with the record having fingerprint \"16ceecfdee4e3dd1113274b5b2da74ba8866bd9351efaa21db08af8395185d22\"","the record with the same name \"config/pod/openshift-controller-manager/controller-manager-6954c8766d-g8z48.json\" was already recorded and had the fingerprint \"245f440d1a92135dffca8628dcc90ded6981495c3c35b0630873722af7696dde\", overwriting with the record having fingerprint \"245f440d1a92135dffca8628dcc90ded6981495c3c35b0630873722af7696dde\""],"warnings":["warning: the record with the same fingerprint \"3d39b569e1181373e2200d17fc0de11215f1e7b54241fefb9e12008d37a46260\" was already recorded at path \"config/pod/openshift-catalogd/catalogd-controller-manager-7f8b8b6f4c-f46qd.json\", recording another one with a different path \"config/pod/openshift-catalogd/catalogd-controller-manager-7f8b8b6f4c-f46qd.json\"","warning: the record with the same fingerprint \"26b694f01b4d852a5927420e3d7b51b98554b841f0b5df56d72639c965dfd544\" was already recorded at path \"config/pod/openshift-operator-controller/operator-controller-controller-manager-6598bfb6c4-bg6zf.json\", recording another one with a different path \"config/pod/openshift-operator-controller/operator-controller-controller-manager-6598bfb6c4-bg6zf.json\"","warning: the record with the same fingerprint \"139cca6417027560975e57795d5aad2f5b242ad8cbd0e3733fe3b9c1310c7085\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-df8wr.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-df8wr.json\"","warning: the record with the same fingerprint \"747df0f66c73fb690868282bcf217359ec82f9001ce9ed88f2689e4f27706251\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-df8wr/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-df8wr/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"04d51f50420c07e278d307da8e49eb2f2173ff03b1f821487bff6348b28474ab\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-df8wr/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-df8wr/etcd-operator_current.log\"","warning: the record with the same fingerprint \"16ceecfdee4e3dd1113274b5b2da74ba8866bd9351efaa21db08af8395185d22\" was already recorded at path \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-8565d84698-nsg74.json\", recording another one with a different path \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-8565d84698-nsg74.json\"","warning: the record with the same fingerprint \"245f440d1a92135dffca8628dcc90ded6981495c3c35b0630873722af7696dde\" was already recorded at path \"config/pod/openshift-controller-manager/controller-manager-6954c8766d-g8z48.json\", recording another one with a different path \"config/pod/openshift-controller-manager/controller-manager-6954c8766d-g8z48.json\""],"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":14,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":18,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":24,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":57,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":123,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":23,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":20,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":25,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":10,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":13,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":2,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":7,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":27,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":27,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":14,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":15,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":20,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":5823,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":12,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":23,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":27,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":14,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":23121,"records_count":176,"errors":["function \"support_secret\" failed with an error","function \"pod_network_connectivity_checks\" failed with an error","function \"active_alerts\" failed with an error","function \"silenced_alerts\" failed with an error","function \"tsdb_status\" failed with an error","function \"metrics\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-catalogd/catalogd-controller-manager-7f8b8b6f4c-f46qd.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-operator-controller/operator-controller-controller-manager-6598bfb6c4-bg6zf.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-df8wr.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-df8wr/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-df8wr/etcd-operator_current.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-8565d84698-nsg74.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-controller-manager/controller-manager-6954c8766d-g8z48.json\""],"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":15,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":9,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":22,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":91,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":11605,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":26,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":34,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":18,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":18,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":114,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":11,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":12,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":213,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":99,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":12,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":25,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":43,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":77,"records_count":7,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":17,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":179,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":598,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":14,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":17,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":57,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":10843,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":30,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":15,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":42,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":56,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":54,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":17,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":157,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":29.895,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515154764732020000 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515154764732021102 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005536115154764732014265 0ustar0000000000000000{"pods":81,"imageCount":68,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:4855408bd0e4d0711383d0c14dcad53c98255ff9f83f6cbefb57e47eacc1f1f1","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:8c978bb5c329452b181f61f00452b4c2bfd83d245db56050bc7607972a791a76","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b714a7ada1e295b599b432f32e1fd5b74c8cdbe6fe51e95306322b25cb873914","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:898c67bf7fc973e99114f3148976a6c21ae0dbe413051415588fa9b995f5b331","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:1295a1f0e74ae87f51a733e28b64c6fdb6b9a5b069a6897b3870fe52cc1c3b0b","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":1,"terminalCount":1,"shapes":[]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9bd0b71d620cf0acbfcd1b58797dc30050bd167cb6b7a7f62c8333dd370c76d5","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":1,"terminalCount":1,"shapes":[]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:042e6a37747405da54cf91543d44408c9531327a2cce653c41ca851aa7c896d8","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b8cb5e0caeca0fb02f3e8c72b7ddf1c49e3c602e42e119ba30c60525f1db1821","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b9b8bc43bac294be3c7669cde049e388ad9d8751242051ba40f83e1c401eceda","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ebee49810f493f9b566740bd61256fd40b897cc51423f1efa01a02bb57ce177d","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d470dba32064cc62b2ab29303d6e00612304548262eaa2f4e5b40a00a26f71ce","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d470dba32064cc62b2ab29303d6e00612304548262eaa2f4e5b40a00a26f71ce","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:00b591b3820682dc99f16f07a3a0a4ec06dfedba63cd0f79b998ac4509fabea3","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:2508a5f66e509e813cb09825b5456be91b4cdd4d02f470f22a33de42c753f2b7","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","firstCommand":"zT6_GoC4_8OY","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"aC8iSHmKHojh","firstArg":"eE7ekwlit3Mq"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":7,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3ef4b76f6b989bf3e802d22aff457a019d9c232f0ea8d927ac6ce2d854fe48d7","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:243ce0f08a360370edf4960aec94fc6c5be9d4aae26cf8c5320adcd047c1b14f","firstArg":"P0uRYWPWnbxt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:3888758fa24689d4e63dfb78ed97a852c687295adcabdabf8cdc4a2beaa42398","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3888758fa24689d4e63dfb78ed97a852c687295adcabdabf8cdc4a2beaa42398","firstCommand":"icTsn2s_EIax","firstArg":"SCcKjYHEPDKM"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:bececf32872455775075a3d35100302396ca58ae29827b24d7df086d8ac14432","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3bedf16a5f527126e934c37d2f24886de4a54c9bd9d45b18821d02eefd8b5f9e","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:bc516f6eb3028f5169f1712ac1878d4b591174fd7c363f4ee5aa63162aa01b0e","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:28f33d62fd0b94c5ea0ebcd7a4216848c8dd671a38d901ce98f4c399b700e1c7","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000011642015154764724033774 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-7b564dfc5b-qc9cq2026-03-13T10:39:31.726040261Z E0313 10:39:31.726007 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:31.726040261Z E0313 10:39:31.726007 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:31.726194395Z E0313 10:39:31.726171 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:31.726400591Z E0313 10:39:31.726378 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:32.052402765Z E0313 10:39:32.052337 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:32.052456066Z E0313 10:39:32.052419 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:32.052520968Z E0313 10:39:32.052485 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:32.052558379Z E0313 10:39:32.052481 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:32.053076653Z E0313 10:39:32.052981 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:32.518014892Z W0313 10:39:32.517965 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.155.186:50051: connect: connection refused" 2026-03-13T10:39:32.518077684Z W0313 10:39:32.518033 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.49.104:50051: connect: connection refused" 2026-03-13T10:39:32.518116745Z W0313 10:39:32.518003 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.227.229:50051: connect: connection refused" 2026-03-13T10:39:32.518169486Z W0313 10:39:32.518003 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.60.105:50051: connect: connection refused" 2026-03-13T10:39:32.704038233Z E0313 10:39:32.703969 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:32.704072424Z E0313 10:39:32.704048 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:32.704072424Z E0313 10:39:32.704055 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:32.704184907Z E0313 10:39:32.703969 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:32.704527496Z E0313 10:39:32.704511 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:33.992262512Z E0313 10:39:33.992191 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:33.992304114Z E0313 10:39:33.992252 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:33.992418607Z E0313 10:39:33.992384 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:33.992513189Z E0313 10:39:33.992495 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:33.992645143Z E0313 10:39:33.992501 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:34.033064632Z W0313 10:39:34.033008 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.49.104:50051: connect: connection refused" 2026-03-13T10:39:34.304651936Z W0313 10:39:34.304610 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.227.229:50051: connect: connection refused" 2026-03-13T10:39:34.393472706Z W0313 10:39:34.393378 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.60.105:50051: connect: connection refused" 2026-03-13T10:39:34.396985519Z W0313 10:39:34.396965 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.155.186:50051: connect: connection refused" 2026-03-13T10:39:36.555354776Z E0313 10:39:36.555287 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:36.555536451Z E0313 10:39:36.555511 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:36.555640984Z E0313 10:39:36.555615 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:36.555640984Z E0313 10:39:36.555621 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:36.555751387Z E0313 10:39:36.555511 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:36.708921949Z W0313 10:39:36.708841 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.60.105:50051: connect: connection refused" 2026-03-13T10:39:36.833515265Z W0313 10:39:36.833439 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.49.104:50051: connect: connection refused" 2026-03-13T10:39:36.846210501Z W0313 10:39:36.846152 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.227.229:50051: connect: connection refused" 2026-03-13T10:39:37.279182775Z W0313 10:39:37.279118 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.155.186:50051: connect: connection refused" 2026-03-13T10:39:40.188186209Z W0313 10:39:40.188118 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.227.229:50051: connect: connection refused" 2026-03-13T10:39:41.243412825Z W0313 10:39:41.243321 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.49.104:50051: connect: connection refused" 2026-03-13T10:39:41.580208775Z W0313 10:39:41.580109 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.155.186:50051: connect: connection refused" 2026-03-13T10:39:41.609475089Z W0313 10:39:41.609360 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.60.105:50051: connect: connection refused" 2026-03-13T10:39:41.681892065Z E0313 10:39:41.681828 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:41.681892065Z E0313 10:39:41.681873 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:41.681949096Z E0313 10:39:41.681887 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:41.681949096Z E0313 10:39:41.681891 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:41.682248394Z E0313 10:39:41.682211 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:47.681508557Z W0313 10:39:47.681452 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.227.229:50051: connect: connection refused" 2026-03-13T10:39:47.866559592Z W0313 10:39:47.866475 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.60.105:50051: connect: connection refused" 2026-03-13T10:39:48.213019877Z W0313 10:39:48.212945 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.155.186:50051: connect: connection refused" 2026-03-13T10:39:48.363436716Z W0313 10:39:48.363342 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.49.104:50051: connect: connection refused" 2026-03-13T10:39:51.925538668Z E0313 10:39:51.925484 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:51.925579249Z E0313 10:39:51.925562 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:51.925875026Z E0313 10:39:51.925843 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:51.925972769Z E0313 10:39:51.925913 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:51.926043531Z E0313 10:39:51.925484 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:57.197731038Z W0313 10:39:57.197667 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.155.186:50051: connect: connection refused" 2026-03-13T10:39:57.555031520Z W0313 10:39:57.554960 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.49.104:50051: connect: connection refused" 2026-03-13T10:39:58.783785526Z W0313 10:39:58.782765 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.227.229:50051: connect: connection refused" 2026-03-13T10:39:59.035276219Z W0313 10:39:59.035228 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.60.105:50051: connect: connection refused" 2026-03-13T10:39:59.850026862Z E0313 10:39:59.849961 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.850104724Z E0313 10:39:59.850072 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.850392892Z E0313 10:39:59.850319 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.850473894Z E0313 10:39:59.850449 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.850485374Z E0313 10:39:59.850479 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.933495440Z E0313 10:39:59.933422 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.942601081Z E0313 10:39:59.942547 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:12.413210198Z E0313 10:40:12.413138 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:12.413290160Z E0313 10:40:12.413268 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:12.413290160Z E0313 10:40:12.413268 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:12.413298641Z E0313 10:40:12.413278 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:12.413308281Z E0313 10:40:12.413278 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:16.002679094Z W0313 10:40:16.002395 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.227.229:50051: connect: connection refused" 2026-03-13T10:40:18.371277873Z time="2026-03-13T10:40:18Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-13T10:40:20.134479222Z time="2026-03-13T10:40:20Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-13T10:40:20.220013325Z time="2026-03-13T10:40:20Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-13T10:40:22.273744538Z time="2026-03-13T10:40:22Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-13T10:40:22.273744538Z time="2026-03-13T10:40:22Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.227.229:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-13T10:40:22.273744538Z time="2026-03-13T10:40:22Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-13T10:40:29.845449635Z E0313 10:40:29.845366 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:29.848061935Z E0313 10:40:29.846887 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:29.848344863Z E0313 10:40:29.846947 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:29.848540148Z E0313 10:40:29.847012 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:29.848613550Z E0313 10:40:29.847078 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:42.416413812Z E0313 10:40:42.416299 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:42.416413812Z E0313 10:40:42.416334 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:42.416734170Z E0313 10:40:42.416673 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:42.416857244Z E0313 10:40:42.416804 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:42.416986717Z E0313 10:40:42.416934 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.842949608Z E0313 10:40:59.842499 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.842949608Z E0313 10:40:59.842669 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.842949608Z E0313 10:40:59.842810 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.845710952Z E0313 10:40:59.843054 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.845710952Z E0313 10:40:59.843230 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.931523782Z E0313 10:40:59.931445 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.936883127Z E0313 10:40:59.936825 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:41:03.477280107Z time="2026-03-13T10:41:03Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-13T10:41:12.423356387Z E0313 10:41:12.423286 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:41:12.425496905Z E0313 10:41:12.423669 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:41:12.425496905Z E0313 10:41:12.423864 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:41:12.425496905Z E0313 10:41:12.424617 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:41:12.425496905Z E0313 10:41:12.424816 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" package-server-manager_current.log0000640000000000000000000004105315154764724036625 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-854648ff6d-d5b452026-03-13T10:38:54.892568758Z 2026-03-13T10:38:54Z INFO setup starting manager 2026-03-13T10:38:54.902910182Z 2026-03-13T10:38:54Z INFO controller-runtime.metrics Starting metrics server 2026-03-13T10:38:54.903210082Z 2026-03-13T10:38:54Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-03-13T10:38:54.903210082Z 2026-03-13T10:38:54Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-03-13T10:38:54.903452559Z 2026-03-13T10:38:54Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-03-13T10:38:54.917856906Z I0313 10:38:54.916748 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-03-13T10:38:54.950192578Z I0313 10:38:54.949977 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-03-13T10:38:54.954850219Z 2026-03-13T10:38:54Z DEBUG events package-server-manager-854648ff6d-d5b45_49a2a9b8-bf17-4ab4-ab94-e2263d56e025 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"036d436b-8005-4eb1-ac1d-5ac7277bd400","apiVersion":"coordination.k8s.io/v1","resourceVersion":"8381"}, "reason": "LeaderElection"} 2026-03-13T10:38:54.982611132Z 2026-03-13T10:38:54Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-03-13T10:38:54.982611132Z 2026-03-13T10:38:54Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-03-13T10:38:54.982673974Z 2026-03-13T10:38:54Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-03-13T10:38:55.119245329Z 2026-03-13T10:38:55Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-03-13T10:38:55.119325562Z 2026-03-13T10:38:55Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-03-13T10:38:55.119547879Z 2026-03-13T10:38:55Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T10:38:55.119547879Z 2026-03-13T10:38:55Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:38:55.424486265Z 2026-03-13T10:38:55Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:38:55.424549397Z 2026-03-13T10:38:55Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T10:38:55.455216618Z 2026-03-13T10:38:55Z INFO controllers.packageserver attempting to create the packageserver csv 2026-03-13T10:38:55.460158778Z 2026-03-13T10:38:55Z INFO controllers.packageserver updating csv spec 2026-03-13T10:38:55.482448045Z 2026-03-13T10:38:55Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2026-03-13T10:38:55.482448045Z 2026-03-13T10:38:55Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:38:55.482579269Z 2026-03-13T10:38:55Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T10:38:55.482579269Z 2026-03-13T10:38:55Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:38:55.482847257Z 2026-03-13T10:38:55Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:38:55.483912509Z 2026-03-13T10:38:55Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T10:38:55.502736630Z 2026-03-13T10:38:55Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T10:38:55.502736630Z 2026-03-13T10:38:55Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:38:55.504253177Z 2026-03-13T10:38:55Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T10:38:55.504253177Z 2026-03-13T10:38:55Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:38:55.504392441Z 2026-03-13T10:38:55Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:38:55.504434102Z 2026-03-13T10:38:55Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T10:38:55.520405727Z 2026-03-13T10:38:55Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T10:38:55.520405727Z 2026-03-13T10:38:55Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:38:55.520516540Z 2026-03-13T10:38:55Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T10:38:55.520516540Z 2026-03-13T10:38:55Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:38:55.520693416Z 2026-03-13T10:38:55Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:38:55.520707106Z 2026-03-13T10:38:55Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T10:38:55.543458887Z 2026-03-13T10:38:55Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T10:38:55.543458887Z 2026-03-13T10:38:55Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:38:56.157054122Z 2026-03-13T10:38:56Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T10:38:56.157054122Z 2026-03-13T10:38:56Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:38:56.157113694Z 2026-03-13T10:38:56Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:38:56.160797525Z 2026-03-13T10:38:56Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T10:38:56.177332867Z 2026-03-13T10:38:56Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T10:38:56.177332867Z 2026-03-13T10:38:56Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:38:57.024166053Z 2026-03-13T10:38:57Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T10:38:57.024166053Z 2026-03-13T10:38:57Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:38:57.024198244Z 2026-03-13T10:38:57Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:38:57.024256206Z 2026-03-13T10:38:57Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T10:38:57.044320215Z 2026-03-13T10:38:57Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T10:38:57.044320215Z 2026-03-13T10:38:57Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:39:28.918632624Z 2026-03-13T10:39:28Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T10:39:28.918632624Z 2026-03-13T10:39:28Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:39:28.918632624Z 2026-03-13T10:39:28Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:39:28.918632624Z 2026-03-13T10:39:28Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T10:39:28.958655023Z 2026-03-13T10:39:28Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T10:39:28.958655023Z 2026-03-13T10:39:28Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:39:28.971645247Z 2026-03-13T10:39:28Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T10:39:28.971645247Z 2026-03-13T10:39:28Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:39:28.971645247Z 2026-03-13T10:39:28Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:39:28.971645247Z 2026-03-13T10:39:28Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T10:39:29.021403703Z 2026-03-13T10:39:29Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T10:39:29.021403703Z 2026-03-13T10:39:29Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:39:29.101668996Z 2026-03-13T10:39:29Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T10:39:29.101668996Z 2026-03-13T10:39:29Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:39:29.101668996Z 2026-03-13T10:39:29Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:39:29.101668996Z 2026-03-13T10:39:29Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T10:39:29.153760314Z 2026-03-13T10:39:29Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T10:39:29.153760314Z 2026-03-13T10:39:29Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:39:29.490533663Z 2026-03-13T10:39:29Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T10:39:29.490533663Z 2026-03-13T10:39:29Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:39:29.499493840Z 2026-03-13T10:39:29Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:39:29.499493840Z 2026-03-13T10:39:29Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T10:39:29.552478162Z 2026-03-13T10:39:29Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T10:39:29.552705188Z 2026-03-13T10:39:29Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:39:29.728346285Z 2026-03-13T10:39:29Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T10:39:29.728346285Z 2026-03-13T10:39:29Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:39:29.728346285Z 2026-03-13T10:39:29Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T10:39:29.728346285Z 2026-03-13T10:39:29Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T10:39:29.781855980Z 2026-03-13T10:39:29Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T10:39:29.781855980Z 2026-03-13T10:39:29Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} kube-rbac-proxy_current.log0000640000000000000000000000160415154764724035326 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-854648ff6d-d5b452026-03-13T10:38:44.213000796Z W0313 10:38:44.212719 1 deprecated.go:66] 2026-03-13T10:38:44.213000796Z ==== Removed Flag Warning ====================== 2026-03-13T10:38:44.213000796Z 2026-03-13T10:38:44.213000796Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-13T10:38:44.213000796Z 2026-03-13T10:38:44.213000796Z =============================================== 2026-03-13T10:38:44.213000796Z 2026-03-13T10:38:44.213618325Z I0313 10:38:44.213539 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-13T10:38:44.215208913Z I0313 10:38:44.215171 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-13T10:38:44.215730239Z I0313 10:38:44.215673 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-13T10:38:44.217091050Z I0313 10:38:44.216348 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 olm-operator_current.log0000640000000000000000000005177415154764724033411 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-d64cfc9db-rsl2h2026-03-13T10:41:13.192029503Z time="2026-03-13T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=Z3vdD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:13.290978097Z time="2026-03-13T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=cUkG/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:13.391501413Z time="2026-03-13T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=TXMLJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:13.491651870Z time="2026-03-13T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=7oaA2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:13.592129155Z time="2026-03-13T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=g2fdm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:13.691895731Z time="2026-03-13T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=eDGJe namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:13.791858952Z time="2026-03-13T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=4U37g namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:13.890941940Z time="2026-03-13T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=5BKvQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:13.990796769Z time="2026-03-13T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=rgppg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:14.092067405Z time="2026-03-13T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=rA20i namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:14.192530040Z time="2026-03-13T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=lwPv2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:14.292407679Z time="2026-03-13T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=Bsbiw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:14.391993031Z time="2026-03-13T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=kxOq+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:14.492558408Z time="2026-03-13T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=RLuJa namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:14.592074637Z time="2026-03-13T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=o7xxP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:14.691130594Z time="2026-03-13T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=0729j namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:14.791391524Z time="2026-03-13T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=hLcWZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:14.891513460Z time="2026-03-13T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=QS1Zz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:14.991094581Z time="2026-03-13T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=LqWn3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:15.091237617Z time="2026-03-13T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=K3VxN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:15.190836359Z time="2026-03-13T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=2RSTS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:15.292561857Z time="2026-03-13T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=LV9QD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:15.391854070Z time="2026-03-13T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=VVzo9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:15.491281827Z time="2026-03-13T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=NZfXc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:15.593289183Z time="2026-03-13T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=neRKq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:15.692286859Z time="2026-03-13T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=RpJwt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:15.792065505Z time="2026-03-13T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=9COcV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:15.892576201Z time="2026-03-13T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=aeEsn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:15.992391079Z time="2026-03-13T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=jrWG5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:16.091544888Z time="2026-03-13T10:41:16Z" level=info msg="install strategy successful" csv=packageserver id=I+MF7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:16.192477476Z time="2026-03-13T10:41:16Z" level=info msg="install strategy successful" csv=packageserver id=0rCtQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:16.292578961Z time="2026-03-13T10:41:16Z" level=info msg="install strategy successful" csv=packageserver id=/watd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:16.391638528Z time="2026-03-13T10:41:16Z" level=info msg="install strategy successful" csv=packageserver id=eATh6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:16.491645621Z time="2026-03-13T10:41:16Z" level=info msg="install strategy successful" csv=packageserver id=8epEq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:16.592288440Z time="2026-03-13T10:41:16Z" level=info msg="install strategy successful" csv=packageserver id=XmGRa namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:16.691625875Z time="2026-03-13T10:41:16Z" level=info msg="install strategy successful" csv=packageserver id=+6p6R namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:16.791563096Z time="2026-03-13T10:41:16Z" level=info msg="install strategy successful" csv=packageserver id=k73+l namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:16.891865456Z time="2026-03-13T10:41:16Z" level=info msg="install strategy successful" csv=packageserver id=dSE+q namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:16.992615069Z time="2026-03-13T10:41:16Z" level=info msg="install strategy successful" csv=packageserver id=XlPe0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:17.091974364Z time="2026-03-13T10:41:17Z" level=info msg="install strategy successful" csv=packageserver id=dei0z namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:17.191930215Z time="2026-03-13T10:41:17Z" level=info msg="install strategy successful" csv=packageserver id=fRKrG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:17.291792194Z time="2026-03-13T10:41:17Z" level=info msg="install strategy successful" csv=packageserver id=RIhSg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:17.394646603Z time="2026-03-13T10:41:17Z" level=info msg="install strategy successful" csv=packageserver id=eL27e namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:17.490492054Z time="2026-03-13T10:41:17Z" level=info msg="install strategy successful" csv=packageserver id=ZpsC9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:17.591576465Z time="2026-03-13T10:41:17Z" level=info msg="install strategy successful" csv=packageserver id=joaxT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:17.691618619Z time="2026-03-13T10:41:17Z" level=info msg="install strategy successful" csv=packageserver id=oE5FV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:17.792293389Z time="2026-03-13T10:41:17Z" level=info msg="install strategy successful" csv=packageserver id=yQZ1F namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:17.892781545Z time="2026-03-13T10:41:17Z" level=info msg="install strategy successful" csv=packageserver id=unbXR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:17.992186191Z time="2026-03-13T10:41:17Z" level=info msg="install strategy successful" csv=packageserver id=YVoHK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:18.091806653Z time="2026-03-13T10:41:18Z" level=info msg="install strategy successful" csv=packageserver id=p++Sf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:18.191137118Z time="2026-03-13T10:41:18Z" level=info msg="install strategy successful" csv=packageserver id=b9yVi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:18.291538461Z time="2026-03-13T10:41:18Z" level=info msg="install strategy successful" csv=packageserver id=xe+38 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:18.391980285Z time="2026-03-13T10:41:18Z" level=info msg="install strategy successful" csv=packageserver id=0hA8j namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:18.492537393Z time="2026-03-13T10:41:18Z" level=info msg="install strategy successful" csv=packageserver id=NAEnP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:18.595527456Z time="2026-03-13T10:41:18Z" level=info msg="install strategy successful" csv=packageserver id=XTmCm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:18.696159865Z time="2026-03-13T10:41:18Z" level=info msg="install strategy successful" csv=packageserver id=djrJd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:18.797538294Z time="2026-03-13T10:41:18Z" level=info msg="install strategy successful" csv=packageserver id=UjvpT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:18.891259737Z time="2026-03-13T10:41:18Z" level=info msg="install strategy successful" csv=packageserver id=iBqYn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:18.992376219Z time="2026-03-13T10:41:18Z" level=info msg="install strategy successful" csv=packageserver id=mgJYQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:19.091499318Z time="2026-03-13T10:41:19Z" level=info msg="install strategy successful" csv=packageserver id=O4hEK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:19.192290962Z time="2026-03-13T10:41:19Z" level=info msg="install strategy successful" csv=packageserver id=z/cXA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:19.291833542Z time="2026-03-13T10:41:19Z" level=info msg="install strategy successful" csv=packageserver id=ql8Dc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:19.394185038Z time="2026-03-13T10:41:19Z" level=info msg="install strategy successful" csv=packageserver id=FdeHw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:19.491642651Z time="2026-03-13T10:41:19Z" level=info msg="install strategy successful" csv=packageserver id=Qxpa6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:19.591821539Z time="2026-03-13T10:41:19Z" level=info msg="install strategy successful" csv=packageserver id=CuYKi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:19.691996336Z time="2026-03-13T10:41:19Z" level=info msg="install strategy successful" csv=packageserver id=TeVny namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:19.792251035Z time="2026-03-13T10:41:19Z" level=info msg="install strategy successful" csv=packageserver id=YRsHm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:19.890727436Z time="2026-03-13T10:41:19Z" level=info msg="install strategy successful" csv=packageserver id=72GkM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:19.991085808Z time="2026-03-13T10:41:19Z" level=info msg="install strategy successful" csv=packageserver id=qkng0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:20.092399276Z time="2026-03-13T10:41:20Z" level=info msg="install strategy successful" csv=packageserver id=TZ3YX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:20.191944126Z time="2026-03-13T10:41:20Z" level=info msg="install strategy successful" csv=packageserver id=WwHc4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:20.292812082Z time="2026-03-13T10:41:20Z" level=info msg="install strategy successful" csv=packageserver id=18hCI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:20.391509149Z time="2026-03-13T10:41:20Z" level=info msg="install strategy successful" csv=packageserver id=Jo4mw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:20.492143289Z time="2026-03-13T10:41:20Z" level=info msg="install strategy successful" csv=packageserver id=LvEsB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:20.591264358Z time="2026-03-13T10:41:20Z" level=info msg="install strategy successful" csv=packageserver id=vYSMD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:20.691858876Z time="2026-03-13T10:41:20Z" level=info msg="install strategy successful" csv=packageserver id=ndHJW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:20.793043900Z time="2026-03-13T10:41:20Z" level=info msg="install strategy successful" csv=packageserver id=Qw3qL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:20.892743365Z time="2026-03-13T10:41:20Z" level=info msg="install strategy successful" csv=packageserver id=7SNVq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:20.992196703Z time="2026-03-13T10:41:20Z" level=info msg="install strategy successful" csv=packageserver id=aNtqd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:21.092195755Z time="2026-03-13T10:41:21Z" level=info msg="install strategy successful" csv=packageserver id=XK4FH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:21.192365112Z time="2026-03-13T10:41:21Z" level=info msg="install strategy successful" csv=packageserver id=lxFBS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:21.292659762Z time="2026-03-13T10:41:21Z" level=info msg="install strategy successful" csv=packageserver id=mhUGN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:21.391631537Z time="2026-03-13T10:41:21Z" level=info msg="install strategy successful" csv=packageserver id=bfUNf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:21.492006940Z time="2026-03-13T10:41:21Z" level=info msg="install strategy successful" csv=packageserver id=flzro namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:21.593145962Z time="2026-03-13T10:41:21Z" level=info msg="install strategy successful" csv=packageserver id=45YCF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:21.692161708Z time="2026-03-13T10:41:21Z" level=info msg="install strategy successful" csv=packageserver id=EHvnX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:21.791423121Z time="2026-03-13T10:41:21Z" level=info msg="install strategy successful" csv=packageserver id=fql2P namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:21.891383522Z time="2026-03-13T10:41:21Z" level=info msg="install strategy successful" csv=packageserver id=kOpAz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:21.991722494Z time="2026-03-13T10:41:21Z" level=info msg="install strategy successful" csv=packageserver id=zhalW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:22.091930561Z time="2026-03-13T10:41:22Z" level=info msg="install strategy successful" csv=packageserver id=GD4cl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:22.192160810Z time="2026-03-13T10:41:22Z" level=info msg="install strategy successful" csv=packageserver id=TKYyc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:22.291877765Z time="2026-03-13T10:41:22Z" level=info msg="install strategy successful" csv=packageserver id=O1LWM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:22.391517668Z time="2026-03-13T10:41:22Z" level=info msg="install strategy successful" csv=packageserver id=Q+IcD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:22.491978751Z time="2026-03-13T10:41:22Z" level=info msg="install strategy successful" csv=packageserver id=bCN5T namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:22.591545212Z time="2026-03-13T10:41:22Z" level=info msg="install strategy successful" csv=packageserver id=qZdm8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:22.695813040Z time="2026-03-13T10:41:22Z" level=info msg="install strategy successful" csv=packageserver id=+Ukmz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:22.792082512Z time="2026-03-13T10:41:22Z" level=info msg="install strategy successful" csv=packageserver id=EuKmj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:22.891744665Z time="2026-03-13T10:41:22Z" level=info msg="install strategy successful" csv=packageserver id=MMmPM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:22.992601920Z time="2026-03-13T10:41:22Z" level=info msg="install strategy successful" csv=packageserver id=PeWt+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T10:41:23.092222742Z time="2026-03-13T10:41:23Z" level=info msg="install strategy successful" csv=packageserver id=d+7NL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment catalog-operator_current.log0000640000000000000000000005702315154764724034703 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-7d9c49f57b-2j5jl2026-03-13T10:40:20.202374340Z time="2026-03-13T10:40:20Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=XhGfo 2026-03-13T10:40:20.202374340Z time="2026-03-13T10:40:20Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jdzpd current-pod.namespace=openshift-marketplace id=XhGfo 2026-03-13T10:40:20.202434521Z time="2026-03-13T10:40:20Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jdzpd current-pod.namespace=openshift-marketplace id=XhGfo 2026-03-13T10:40:20.202504713Z time="2026-03-13T10:40:20Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=XhGfo 2026-03-13T10:40:20.202504713Z time="2026-03-13T10:40:20Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=XhGfo 2026-03-13T10:40:20.221132985Z time="2026-03-13T10:40:20Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=QrC6c 2026-03-13T10:40:20.221132985Z time="2026-03-13T10:40:20Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=QrC6c 2026-03-13T10:40:20.222140052Z time="2026-03-13T10:40:20Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9Kfkd 2026-03-13T10:40:20.222158242Z time="2026-03-13T10:40:20Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9Kfkd 2026-03-13T10:40:20.537342928Z time="2026-03-13T10:40:20Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=QrC6c 2026-03-13T10:40:20.537342928Z time="2026-03-13T10:40:20Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-vr4ts current-pod.namespace=openshift-marketplace id=QrC6c 2026-03-13T10:40:20.537342928Z time="2026-03-13T10:40:20Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-vr4ts current-pod.namespace=openshift-marketplace id=QrC6c 2026-03-13T10:40:20.537342928Z time="2026-03-13T10:40:20Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=QrC6c 2026-03-13T10:40:20.537342928Z time="2026-03-13T10:40:20Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=QrC6c 2026-03-13T10:40:20.537342928Z time="2026-03-13T10:40:20Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=QrC6c 2026-03-13T10:40:20.725321130Z time="2026-03-13T10:40:20Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9Kfkd 2026-03-13T10:40:20.725364581Z time="2026-03-13T10:40:20Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-bgvrc current-pod.namespace=openshift-marketplace id=9Kfkd 2026-03-13T10:40:20.725373901Z time="2026-03-13T10:40:20Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-bgvrc current-pod.namespace=openshift-marketplace id=9Kfkd 2026-03-13T10:40:20.725394192Z time="2026-03-13T10:40:20Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=9Kfkd 2026-03-13T10:40:20.725394192Z time="2026-03-13T10:40:20Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9Kfkd 2026-03-13T10:40:20.725394192Z time="2026-03-13T10:40:20Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9Kfkd 2026-03-13T10:40:21.731896800Z time="2026-03-13T10:40:21Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=QrC6c 2026-03-13T10:40:21.731896800Z time="2026-03-13T10:40:21Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-vr4ts current-pod.namespace=openshift-marketplace id=QrC6c 2026-03-13T10:40:21.731896800Z time="2026-03-13T10:40:21Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-vr4ts current-pod.namespace=openshift-marketplace id=QrC6c 2026-03-13T10:40:21.731896800Z time="2026-03-13T10:40:21Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=QrC6c 2026-03-13T10:40:21.731896800Z time="2026-03-13T10:40:21Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=QrC6c 2026-03-13T10:40:21.748178398Z time="2026-03-13T10:40:21Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ajJS1 2026-03-13T10:40:21.748178398Z time="2026-03-13T10:40:21Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ajJS1 2026-03-13T10:40:21.925102522Z time="2026-03-13T10:40:21Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9Kfkd 2026-03-13T10:40:21.925102522Z time="2026-03-13T10:40:21Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-bgvrc current-pod.namespace=openshift-marketplace id=9Kfkd 2026-03-13T10:40:21.925102522Z time="2026-03-13T10:40:21Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-bgvrc current-pod.namespace=openshift-marketplace id=9Kfkd 2026-03-13T10:40:21.925102522Z time="2026-03-13T10:40:21Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9Kfkd 2026-03-13T10:40:21.925102522Z time="2026-03-13T10:40:21Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9Kfkd 2026-03-13T10:40:21.925282386Z time="2026-03-13T10:40:21Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BH6h2 2026-03-13T10:40:21.925282386Z time="2026-03-13T10:40:21Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BH6h2 2026-03-13T10:40:22.523899283Z time="2026-03-13T10:40:22Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ajJS1 2026-03-13T10:40:22.524054728Z time="2026-03-13T10:40:22Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-mrztj current-pod.namespace=openshift-marketplace id=ajJS1 2026-03-13T10:40:22.524063488Z time="2026-03-13T10:40:22Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-mrztj current-pod.namespace=openshift-marketplace id=ajJS1 2026-03-13T10:40:22.524084888Z time="2026-03-13T10:40:22Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=ajJS1 2026-03-13T10:40:22.524084888Z time="2026-03-13T10:40:22Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ajJS1 2026-03-13T10:40:22.524092999Z time="2026-03-13T10:40:22Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ajJS1 2026-03-13T10:40:22.723352684Z time="2026-03-13T10:40:22Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BH6h2 2026-03-13T10:40:22.723612441Z time="2026-03-13T10:40:22Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jdzpd current-pod.namespace=openshift-marketplace id=BH6h2 2026-03-13T10:40:22.723612441Z time="2026-03-13T10:40:22Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jdzpd current-pod.namespace=openshift-marketplace id=BH6h2 2026-03-13T10:40:22.723612441Z time="2026-03-13T10:40:22Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=BH6h2 2026-03-13T10:40:22.723612441Z time="2026-03-13T10:40:22Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BH6h2 2026-03-13T10:40:22.723612441Z time="2026-03-13T10:40:22Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BH6h2 2026-03-13T10:40:23.721770604Z time="2026-03-13T10:40:23Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ajJS1 2026-03-13T10:40:23.721924918Z time="2026-03-13T10:40:23Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-mrztj current-pod.namespace=openshift-marketplace id=ajJS1 2026-03-13T10:40:23.721924918Z time="2026-03-13T10:40:23Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-mrztj current-pod.namespace=openshift-marketplace id=ajJS1 2026-03-13T10:40:23.722025811Z time="2026-03-13T10:40:23Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ajJS1 2026-03-13T10:40:23.722025811Z time="2026-03-13T10:40:23Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ajJS1 2026-03-13T10:40:23.722112274Z time="2026-03-13T10:40:23Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=lsqro 2026-03-13T10:40:23.722121804Z time="2026-03-13T10:40:23Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=lsqro 2026-03-13T10:40:23.922264363Z time="2026-03-13T10:40:23Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BH6h2 2026-03-13T10:40:23.922447027Z time="2026-03-13T10:40:23Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jdzpd current-pod.namespace=openshift-marketplace id=BH6h2 2026-03-13T10:40:23.922469228Z time="2026-03-13T10:40:23Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jdzpd current-pod.namespace=openshift-marketplace id=BH6h2 2026-03-13T10:40:23.922580051Z time="2026-03-13T10:40:23Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BH6h2 2026-03-13T10:40:23.922617402Z time="2026-03-13T10:40:23Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BH6h2 2026-03-13T10:40:24.322762995Z time="2026-03-13T10:40:24Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=lsqro 2026-03-13T10:40:24.322916140Z time="2026-03-13T10:40:24Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-vr4ts current-pod.namespace=openshift-marketplace id=lsqro 2026-03-13T10:40:24.322924990Z time="2026-03-13T10:40:24Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-vr4ts current-pod.namespace=openshift-marketplace id=lsqro 2026-03-13T10:40:24.322950060Z time="2026-03-13T10:40:24Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=lsqro 2026-03-13T10:40:24.322950060Z time="2026-03-13T10:40:24Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=lsqro 2026-03-13T10:40:24.322967501Z time="2026-03-13T10:40:24Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=lsqro 2026-03-13T10:40:24.921390423Z time="2026-03-13T10:40:24Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=lsqro 2026-03-13T10:40:24.921695751Z time="2026-03-13T10:40:24Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-vr4ts current-pod.namespace=openshift-marketplace id=lsqro 2026-03-13T10:40:24.921759143Z time="2026-03-13T10:40:24Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-vr4ts current-pod.namespace=openshift-marketplace id=lsqro 2026-03-13T10:40:24.921952348Z time="2026-03-13T10:40:24Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=lsqro 2026-03-13T10:40:24.922009639Z time="2026-03-13T10:40:24Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=lsqro 2026-03-13T10:41:03.448834571Z time="2026-03-13T10:41:03Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=redhat-operators state.State=READY" 2026-03-13T10:41:03.448886482Z time="2026-03-13T10:41:03Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=jPdK9 2026-03-13T10:41:03.448886482Z time="2026-03-13T10:41:03Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=jPdK9 2026-03-13T10:41:03.448917273Z time="2026-03-13T10:41:03Z" level=info msg="resolving sources" id=hfyVH namespace=openshift-marketplace 2026-03-13T10:41:03.448924403Z time="2026-03-13T10:41:03Z" level=info msg="checking if subscriptions need update" id=hfyVH namespace=openshift-marketplace 2026-03-13T10:41:03.453185738Z time="2026-03-13T10:41:03Z" level=info msg="No subscriptions were found in namespace openshift-marketplace" id=hfyVH namespace=openshift-marketplace 2026-03-13T10:41:03.454566085Z time="2026-03-13T10:41:03Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=jPdK9 2026-03-13T10:41:03.454752530Z time="2026-03-13T10:41:03Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jdzpd current-pod.namespace=openshift-marketplace id=jPdK9 2026-03-13T10:41:03.454752530Z time="2026-03-13T10:41:03Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jdzpd current-pod.namespace=openshift-marketplace id=jPdK9 2026-03-13T10:41:03.454776921Z time="2026-03-13T10:41:03Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=jPdK9 2026-03-13T10:41:03.454776921Z time="2026-03-13T10:41:03Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=jPdK9 2026-03-13T10:41:03.454784601Z time="2026-03-13T10:41:03Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=jPdK9 2026-03-13T10:41:03.467935885Z time="2026-03-13T10:41:03Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=jPdK9 2026-03-13T10:41:03.468090569Z time="2026-03-13T10:41:03Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jdzpd current-pod.namespace=openshift-marketplace id=jPdK9 2026-03-13T10:41:03.468090569Z time="2026-03-13T10:41:03Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jdzpd current-pod.namespace=openshift-marketplace id=jPdK9 2026-03-13T10:41:03.468199202Z time="2026-03-13T10:41:03Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=jPdK9 2026-03-13T10:41:03.468199202Z time="2026-03-13T10:41:03Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=jPdK9 2026-03-13T10:41:03.477577865Z time="2026-03-13T10:41:03Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=u+hDI 2026-03-13T10:41:03.477577865Z time="2026-03-13T10:41:03Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=u+hDI 2026-03-13T10:41:03.485239711Z time="2026-03-13T10:41:03Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=u+hDI 2026-03-13T10:41:03.485402445Z time="2026-03-13T10:41:03Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jdzpd current-pod.namespace=openshift-marketplace id=u+hDI 2026-03-13T10:41:03.485402445Z time="2026-03-13T10:41:03Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jdzpd current-pod.namespace=openshift-marketplace id=u+hDI 2026-03-13T10:41:03.485402445Z time="2026-03-13T10:41:03Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=u+hDI 2026-03-13T10:41:03.485402445Z time="2026-03-13T10:41:03Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=u+hDI 2026-03-13T10:41:03.485402445Z time="2026-03-13T10:41:03Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=u+hDI 2026-03-13T10:41:03.503633126Z time="2026-03-13T10:41:03Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=u+hDI 2026-03-13T10:41:03.503778770Z time="2026-03-13T10:41:03Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jdzpd current-pod.namespace=openshift-marketplace id=u+hDI 2026-03-13T10:41:03.503778770Z time="2026-03-13T10:41:03Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jdzpd current-pod.namespace=openshift-marketplace id=u+hDI 2026-03-13T10:41:03.503857472Z time="2026-03-13T10:41:03Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=u+hDI 2026-03-13T10:41:03.503857472Z time="2026-03-13T10:41:03Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=u+hDI route-controller-manager_current.log0000640000000000000000000004635015154764724037706 0ustar0000000000000000config/pod/openshift-route-controller-manager/logs/route-controller-manager-657b8bf46d-r5dxm2026-03-13T10:36:44.524814840Z I0313 10:36:44.524572 1 cmd.go:240] Using service-serving-cert provided certificates 2026-03-13T10:36:44.524814840Z I0313 10:36:44.524766 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T10:36:44.525301474Z I0313 10:36:44.525219 1 observer_polling.go:159] Starting file observer 2026-03-13T10:36:44.525761926Z I0313 10:36:44.525731 1 builder.go:298] route-controller-manager version 4.18.0-202602132343.p2.gce6ffa2.assembly.stream.el9-ce6ffa2-ce6ffa24dac3a5f49f70818e1159e40eaf27a6a3 2026-03-13T10:36:44.526659280Z I0313 10:36:44.526613 1 dynamic_serving_content.go:113] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T10:36:45.563532099Z I0313 10:36:45.563462 1 requestheader_controller.go:244] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-13T10:36:45.575237994Z I0313 10:36:45.575180 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-13T10:36:45.575237994Z I0313 10:36:45.575198 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-13T10:36:45.575237994Z I0313 10:36:45.575222 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-13T10:36:45.575237994Z I0313 10:36:45.575227 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-13T10:36:45.588404170Z I0313 10:36:45.588334 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T10:36:45.588404170Z W0313 10:36:45.588366 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:36:45.588404170Z W0313 10:36:45.588371 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:36:45.588404170Z W0313 10:36:45.588376 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T10:36:45.588404170Z W0313 10:36:45.588379 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T10:36:45.588404170Z W0313 10:36:45.588382 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T10:36:45.588404170Z W0313 10:36:45.588385 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T10:36:45.588954925Z I0313 10:36:45.588803 1 genericapiserver.go:514] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-13T10:36:45.613831376Z I0313 10:36:45.613141 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773398171\" (2026-03-13 10:36:27 +0000 UTC to 2028-03-12 10:36:28 +0000 UTC (now=2026-03-13 10:36:45.613096906 +0000 UTC))" 2026-03-13T10:36:45.613831376Z I0313 10:36:45.613284 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773398205\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773398204\" (2026-03-13 09:36:44 +0000 UTC to 2027-03-13 09:36:44 +0000 UTC (now=2026-03-13 10:36:45.613257541 +0000 UTC))" 2026-03-13T10:36:45.613831376Z I0313 10:36:45.613302 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T10:36:45.613831376Z I0313 10:36:45.613325 1 genericapiserver.go:662] [graceful-termination] waiting for shutdown to be initiated 2026-03-13T10:36:45.613831376Z I0313 10:36:45.613349 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController 2026-03-13T10:36:45.613831376Z I0313 10:36:45.613358 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T10:36:45.613831376Z I0313 10:36:45.613387 1 dynamic_serving_content.go:132] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T10:36:45.613831376Z I0313 10:36:45.613501 1 tlsconfig.go:240] "Starting DynamicServingCertificateController" 2026-03-13T10:36:45.613831376Z I0313 10:36:45.613650 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:36:45.613831376Z I0313 10:36:45.613656 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:36:45.613831376Z I0313 10:36:45.613666 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T10:36:45.613831376Z I0313 10:36:45.613670 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:36:45.621714289Z I0313 10:36:45.621030 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-13T10:36:45.621714289Z I0313 10:36:45.621434 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-13T10:36:45.621714289Z I0313 10:36:45.621467 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-13T10:36:45.713919018Z I0313 10:36:45.713837 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:36:45.713919018Z I0313 10:36:45.713879 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T10:36:45.714089672Z I0313 10:36:45.714003 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:36:45.714189215Z I0313 10:36:45.714157 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-13 10:24:17 +0000 UTC to 2026-03-14 10:24:17 +0000 UTC (now=2026-03-13 10:36:45.714112713 +0000 UTC))" 2026-03-13T10:36:45.714367880Z I0313 10:36:45.714345 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773398171\" (2026-03-13 10:36:27 +0000 UTC to 2028-03-12 10:36:28 +0000 UTC (now=2026-03-13 10:36:45.714324379 +0000 UTC))" 2026-03-13T10:36:45.714534444Z I0313 10:36:45.714469 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773398205\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773398204\" (2026-03-13 09:36:44 +0000 UTC to 2027-03-13 09:36:44 +0000 UTC (now=2026-03-13 10:36:45.714454492 +0000 UTC))" 2026-03-13T10:36:45.714712599Z I0313 10:36:45.714691 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 10:17:45 +0000 UTC to 2036-03-10 10:17:45 +0000 UTC (now=2026-03-13 10:36:45.714678758 +0000 UTC))" 2026-03-13T10:36:45.714725880Z I0313 10:36:45.714712 1 tlsconfig.go:178] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2026-03-14 10:24:19 +0000 UTC (now=2026-03-13 10:36:45.714704519 +0000 UTC))" 2026-03-13T10:36:45.714733290Z I0313 10:36:45.714726 1 tlsconfig.go:178] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2027-03-13 10:24:19 +0000 UTC (now=2026-03-13 10:36:45.714717679 +0000 UTC))" 2026-03-13T10:36:45.714750680Z I0313 10:36:45.714738 1 tlsconfig.go:178] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2027-03-13 10:24:19 +0000 UTC (now=2026-03-13 10:36:45.71473177 +0000 UTC))" 2026-03-13T10:36:45.714766901Z I0313 10:36:45.714751 1 tlsconfig.go:178] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 10:24:16 +0000 UTC to 2036-03-10 10:24:16 +0000 UTC (now=2026-03-13 10:36:45.71474483 +0000 UTC))" 2026-03-13T10:36:45.714774531Z I0313 10:36:45.714765 1 tlsconfig.go:178] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-13 10:24:17 +0000 UTC to 2026-03-14 10:24:17 +0000 UTC (now=2026-03-13 10:36:45.71475778 +0000 UTC))" 2026-03-13T10:36:45.714897414Z I0313 10:36:45.714879 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773398171\" (2026-03-13 10:36:27 +0000 UTC to 2028-03-12 10:36:28 +0000 UTC (now=2026-03-13 10:36:45.714866713 +0000 UTC))" 2026-03-13T10:36:45.715000157Z I0313 10:36:45.714981 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773398205\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773398204\" (2026-03-13 09:36:44 +0000 UTC to 2027-03-13 09:36:44 +0000 UTC (now=2026-03-13 10:36:45.714967726 +0000 UTC))" 2026-03-13T10:36:45.743354952Z I0313 10:36:45.743050 1 builder.go:439] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T10:36:45.743922328Z I0313 10:36:45.743521 1 leaderelection.go:250] attempting to acquire leader lease openshift-route-controller-manager/openshift-route-controllers... 2026-03-13T10:36:45.761002159Z I0313 10:36:45.760049 1 leaderelection.go:260] successfully acquired lease openshift-route-controller-manager/openshift-route-controllers 2026-03-13T10:36:45.761002159Z I0313 10:36:45.760209 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-route-controller-manager", Name:"openshift-route-controllers", UID:"9b0d49ff-cca2-48f1-a0e6-5f857bea09e2", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"7015", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' route-controller-manager-657b8bf46d-r5dxm_0c4b20db-1fef-4300-a550-c0d554308c71 became leader 2026-03-13T10:36:45.761225695Z I0313 10:36:45.761195 1 controller_manager.go:36] Starting "openshift.io/ingress-ip" 2026-03-13T10:36:45.761225695Z I0313 10:36:45.761211 1 controller_manager.go:46] Started "openshift.io/ingress-ip" 2026-03-13T10:36:45.761225695Z I0313 10:36:45.761216 1 controller_manager.go:36] Starting "openshift.io/ingress-to-route" 2026-03-13T10:36:45.950239547Z I0313 10:36:45.949819 1 ingress.go:262] ingress-to-route metrics registered with prometheus 2026-03-13T10:36:45.950239547Z I0313 10:36:45.949848 1 controller_manager.go:46] Started "openshift.io/ingress-to-route" 2026-03-13T10:36:45.950239547Z I0313 10:36:45.949868 1 controller_manager.go:48] Started Route Controllers 2026-03-13T10:36:45.951359157Z I0313 10:36:45.950550 1 ingress.go:313] Starting controller 2026-03-13T10:36:45.954652116Z I0313 10:36:45.952958 1 reflector.go:359] Caches populated for *v1.IngressClass from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-13T10:36:45.954652116Z I0313 10:36:45.953391 1 reflector.go:359] Caches populated for *v1.Ingress from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-13T10:36:45.954652116Z W0313 10:36:45.953553 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:36:45.954652116Z E0313 10:36:45.953725 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:36:45.974508352Z I0313 10:36:45.973102 1 reflector.go:359] Caches populated for *v1.Service from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-13T10:36:46.011086939Z I0313 10:36:46.010990 1 reflector.go:359] Caches populated for *v1.Secret from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-13T10:36:46.897388672Z W0313 10:36:46.897307 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:36:46.897388672Z E0313 10:36:46.897347 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:36:49.954302187Z W0313 10:36:49.954233 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:36:49.954302187Z E0313 10:36:49.954275 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:36:54.875867423Z W0313 10:36:54.874808 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:36:54.875867423Z E0313 10:36:54.874852 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:37:04.900279885Z W0313 10:37:04.900207 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:37:04.900279885Z E0313 10:37:04.900251 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:37:29.770366872Z W0313 10:37:29.770286 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:37:29.770366872Z E0313 10:37:29.770340 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:38:18.779648130Z W0313 10:38:18.779440 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:38:18.779648130Z E0313 10:38:18.779508 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:38:19.838989907Z E0313 10:38:19.838887 1 leaderelection.go:340] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-13T10:39:00.446296113Z W0313 10:39:00.446179 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:39:00.446296113Z E0313 10:39:00.446237 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:39:47.526895087Z W0313 10:39:47.526805 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:39:47.526895087Z E0313 10:39:47.526853 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:40:44.138546767Z W0313 10:40:44.138468 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:40:44.138726902Z E0313 10:40:44.138709 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) controller-manager_current.log0000640000000000000000000007530515154764724033761 0ustar0000000000000000config/pod/openshift-controller-manager/logs/controller-manager-6954c8766d-g8z482026-03-13T10:38:48.928082354Z E0313 10:38:48.928042 1 service_account_controller.go:369] "Unhandled Error" err="openshift-kube-controller-manager/default failed with : serviceaccounts \"default\" is forbidden: User \"system:serviceaccount:openshift-infra:serviceaccount-pull-secrets-controller\" cannot patch resource \"serviceaccounts\" in API group \"\" in the namespace \"openshift-kube-controller-manager\"" 2026-03-13T10:38:48.947400020Z E0313 10:38:48.947339 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-cluster-node-tuning-operator failed with : rolebindings.rbac.authorization.k8s.io is forbidden: User \"system:serviceaccount:openshift-infra:default-rolebindings-controller\" cannot create resource \"rolebindings\" in API group \"rbac.authorization.k8s.io\" in the namespace \"openshift-cluster-node-tuning-operator\"" 2026-03-13T10:38:48.951351590Z E0313 10:38:48.949377 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-cluster-olm-operator failed with : rolebindings.rbac.authorization.k8s.io is forbidden: User \"system:serviceaccount:openshift-infra:default-rolebindings-controller\" cannot create resource \"rolebindings\" in API group \"rbac.authorization.k8s.io\" in the namespace \"openshift-cluster-olm-operator\"" 2026-03-13T10:38:48.962971403Z E0313 10:38:48.961279 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-cluster-machine-approver failed with : rolebindings.rbac.authorization.k8s.io is forbidden: User \"system:serviceaccount:openshift-infra:default-rolebindings-controller\" cannot create resource \"rolebindings\" in API group \"rbac.authorization.k8s.io\" in the namespace \"openshift-cluster-machine-approver\"" 2026-03-13T10:38:48.962971403Z W0313 10:38:48.961325 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Event: events is forbidden: User "system:serviceaccount:openshift-infra:unidling-controller" cannot list resource "events" in API group "" at the cluster scope 2026-03-13T10:38:48.962971403Z E0313 10:38:48.961385 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Event: failed to list *v1.Event: events is forbidden: User \"system:serviceaccount:openshift-infra:unidling-controller\" cannot list resource \"events\" in API group \"\" at the cluster scope" 2026-03-13T10:38:48.976946367Z E0313 10:38:48.976874 1 serviceaccounts_controller.go:177] "Unhandled Error" err="openshift-cluster-olm-operator failed with : serviceaccounts is forbidden: User \"system:serviceaccount:openshift-infra:serviceaccount-controller\" cannot create resource \"serviceaccounts\" in API group \"\" in the namespace \"openshift-cluster-olm-operator\"" 2026-03-13T10:38:48.983744063Z E0313 10:38:48.981718 1 serviceaccounts_controller.go:177] "Unhandled Error" err="openshift-cluster-node-tuning-operator failed with : serviceaccounts is forbidden: User \"system:serviceaccount:openshift-infra:serviceaccount-controller\" cannot create resource \"serviceaccounts\" in API group \"\" in the namespace \"openshift-cluster-node-tuning-operator\"" 2026-03-13T10:38:49.009158955Z E0313 10:38:49.009099 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-cluster-olm-operator failed with : rolebindings.rbac.authorization.k8s.io is forbidden: User \"system:serviceaccount:openshift-infra:default-rolebindings-controller\" cannot create resource \"rolebindings\" in API group \"rbac.authorization.k8s.io\" in the namespace \"openshift-cluster-olm-operator\"" 2026-03-13T10:38:49.013216278Z E0313 10:38:49.013027 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-cluster-version failed with : rolebindings.rbac.authorization.k8s.io is forbidden: User \"system:serviceaccount:openshift-infra:default-rolebindings-controller\" cannot create resource \"rolebindings\" in API group \"rbac.authorization.k8s.io\" in the namespace \"openshift-cluster-version\"" 2026-03-13T10:38:49.026715498Z E0313 10:38:49.026400 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-cluster-csi-drivers failed with : rolebindings.rbac.authorization.k8s.io is forbidden: User \"system:serviceaccount:openshift-infra:default-rolebindings-controller\" cannot create resource \"rolebindings\" in API group \"rbac.authorization.k8s.io\" in the namespace \"openshift-cluster-csi-drivers\"" 2026-03-13T10:38:49.028146631Z E0313 10:38:49.028086 1 service_account_controller.go:369] "Unhandled Error" err="openshift-kube-scheduler-operator/default failed with : serviceaccounts \"default\" is forbidden: User \"system:serviceaccount:openshift-infra:serviceaccount-pull-secrets-controller\" cannot patch resource \"serviceaccounts\" in API group \"\" in the namespace \"openshift-kube-scheduler-operator\"" 2026-03-13T10:38:49.040145805Z E0313 10:38:49.039155 1 serviceaccounts_controller.go:177] "Unhandled Error" err="openshift-cluster-node-tuning-operator failed with : serviceaccounts is forbidden: User \"system:serviceaccount:openshift-infra:serviceaccount-controller\" cannot create resource \"serviceaccounts\" in API group \"\" in the namespace \"openshift-cluster-node-tuning-operator\"" 2026-03-13T10:38:49.043114396Z E0313 10:38:49.042877 1 serviceaccounts_controller.go:177] "Unhandled Error" err="openshift-cluster-olm-operator failed with : serviceaccounts is forbidden: User \"system:serviceaccount:openshift-infra:serviceaccount-controller\" cannot create resource \"serviceaccounts\" in API group \"\" in the namespace \"openshift-cluster-olm-operator\"" 2026-03-13T10:38:49.072210839Z E0313 10:38:49.072166 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-cluster-storage-operator failed with : rolebindings.rbac.authorization.k8s.io is forbidden: User \"system:serviceaccount:openshift-infra:default-rolebindings-controller\" cannot create resource \"rolebindings\" in API group \"rbac.authorization.k8s.io\" in the namespace \"openshift-cluster-storage-operator\"" 2026-03-13T10:38:49.074069735Z E0313 10:38:49.073968 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-cluster-samples-operator failed with : rolebindings.rbac.authorization.k8s.io is forbidden: User \"system:serviceaccount:openshift-infra:default-rolebindings-controller\" cannot create resource \"rolebindings\" in API group \"rbac.authorization.k8s.io\" in the namespace \"openshift-cluster-samples-operator\"" 2026-03-13T10:38:49.087219404Z E0313 10:38:49.087165 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-cluster-node-tuning-operator failed with : rolebindings.rbac.authorization.k8s.io is forbidden: User \"system:serviceaccount:openshift-infra:default-rolebindings-controller\" cannot create resource \"rolebindings\" in API group \"rbac.authorization.k8s.io\" in the namespace \"openshift-cluster-node-tuning-operator\"" 2026-03-13T10:38:49.102218400Z E0313 10:38:49.102160 1 serviceaccounts_controller.go:177] "Unhandled Error" err="openshift-cluster-samples-operator failed with : serviceaccounts is forbidden: User \"system:serviceaccount:openshift-infra:serviceaccount-controller\" cannot create resource \"serviceaccounts\" in API group \"\" in the namespace \"openshift-cluster-samples-operator\"" 2026-03-13T10:38:49.105632263Z E0313 10:38:49.105529 1 serviceaccounts_controller.go:177] "Unhandled Error" err="openshift-cluster-storage-operator failed with : serviceaccounts is forbidden: User \"system:serviceaccount:openshift-infra:serviceaccount-controller\" cannot create resource \"serviceaccounts\" in API group \"\" in the namespace \"openshift-cluster-storage-operator\"" 2026-03-13T10:38:49.127824667Z E0313 10:38:49.127774 1 service_account_controller.go:369] "Unhandled Error" err="openshift-kube-controller-manager/kube-controller-manager-sa failed with : serviceaccounts \"kube-controller-manager-sa\" is forbidden: User \"system:serviceaccount:openshift-infra:serviceaccount-pull-secrets-controller\" cannot patch resource \"serviceaccounts\" in API group \"\" in the namespace \"openshift-kube-controller-manager\"" 2026-03-13T10:38:49.134719376Z E0313 10:38:49.134662 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-cluster-samples-operator failed with : rolebindings.rbac.authorization.k8s.io is forbidden: User \"system:serviceaccount:openshift-infra:default-rolebindings-controller\" cannot create resource \"rolebindings\" in API group \"rbac.authorization.k8s.io\" in the namespace \"openshift-cluster-samples-operator\"" 2026-03-13T10:38:49.136670756Z E0313 10:38:49.136645 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-cluster-node-tuning-operator failed with : rolebindings.rbac.authorization.k8s.io is forbidden: User \"system:serviceaccount:openshift-infra:default-rolebindings-controller\" cannot create resource \"rolebindings\" in API group \"rbac.authorization.k8s.io\" in the namespace \"openshift-cluster-node-tuning-operator\"" 2026-03-13T10:38:49.149242597Z E0313 10:38:49.149205 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-cluster-olm-operator failed with : rolebindings.rbac.authorization.k8s.io is forbidden: User \"system:serviceaccount:openshift-infra:default-rolebindings-controller\" cannot create resource \"rolebindings\" in API group \"rbac.authorization.k8s.io\" in the namespace \"openshift-cluster-olm-operator\"" 2026-03-13T10:38:49.169876544Z E0313 10:38:49.169752 1 service_account_controller.go:369] "Unhandled Error" err="openshift-cluster-storage-operator/builder failed with : serviceaccounts \"builder\" is forbidden: User \"system:serviceaccount:openshift-infra:serviceaccount-pull-secrets-controller\" cannot patch resource \"serviceaccounts\" in API group \"\" in the namespace \"openshift-cluster-storage-operator\"" 2026-03-13T10:38:49.196434210Z E0313 10:38:49.196386 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-config-operator failed with : rolebindings.rbac.authorization.k8s.io is forbidden: User \"system:serviceaccount:openshift-infra:default-rolebindings-controller\" cannot create resource \"rolebindings\" in API group \"rbac.authorization.k8s.io\" in the namespace \"openshift-config-operator\"" 2026-03-13T10:38:49.198637047Z E0313 10:38:49.198538 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-cluster-storage-operator failed with : rolebindings.rbac.authorization.k8s.io is forbidden: User \"system:serviceaccount:openshift-infra:default-rolebindings-controller\" cannot create resource \"rolebindings\" in API group \"rbac.authorization.k8s.io\" in the namespace \"openshift-cluster-storage-operator\"" 2026-03-13T10:38:49.212299411Z E0313 10:38:49.212252 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-cluster-version failed with : rolebindings.rbac.authorization.k8s.io is forbidden: User \"system:serviceaccount:openshift-infra:default-rolebindings-controller\" cannot create resource \"rolebindings\" in API group \"rbac.authorization.k8s.io\" in the namespace \"openshift-cluster-version\"" 2026-03-13T10:38:49.340715099Z W0313 10:38:49.340630 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io) 2026-03-13T10:38:49.340715099Z E0313 10:38:49.340692 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io)" 2026-03-13T10:38:49.786320866Z W0313 10:38:49.786023 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io) 2026-03-13T10:38:49.786320866Z E0313 10:38:49.786090 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io)" 2026-03-13T10:38:50.180441570Z W0313 10:38:50.180372 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io) 2026-03-13T10:38:50.180441570Z E0313 10:38:50.180430 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io)" 2026-03-13T10:38:50.231797209Z W0313 10:38:50.231507 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T10:38:50.231926303Z E0313 10:38:50.231581 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T10:38:53.299526501Z W0313 10:38:53.299457 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io) 2026-03-13T10:38:53.299676865Z E0313 10:38:53.299657 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io)" 2026-03-13T10:38:53.430284220Z I0313 10:38:53.430176 1 reflector.go:368] Caches populated for *v1.Event from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-13T10:38:53.978342947Z W0313 10:38:53.978277 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io) 2026-03-13T10:38:53.978403808Z E0313 10:38:53.978344 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io)" 2026-03-13T10:38:54.162347102Z W0313 10:38:54.162271 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io) 2026-03-13T10:38:54.162347102Z E0313 10:38:54.162333 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io)" 2026-03-13T10:38:54.462735001Z W0313 10:38:54.462669 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io) 2026-03-13T10:38:54.462778962Z E0313 10:38:54.462744 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io)" 2026-03-13T10:38:55.155651504Z W0313 10:38:55.154828 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io) 2026-03-13T10:38:55.155651504Z E0313 10:38:55.154903 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io)" 2026-03-13T10:38:55.523767539Z W0313 10:38:55.523692 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T10:38:55.523767539Z E0313 10:38:55.523756 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T10:39:02.611978464Z W0313 10:39:02.611881 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io) 2026-03-13T10:39:02.611978464Z E0313 10:39:02.611960 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io)" 2026-03-13T10:39:04.392175532Z W0313 10:39:04.391553 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io) 2026-03-13T10:39:04.392175532Z E0313 10:39:04.391651 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io)" 2026-03-13T10:39:04.625559086Z W0313 10:39:04.623336 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io) 2026-03-13T10:39:04.625559086Z E0313 10:39:04.623413 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io)" 2026-03-13T10:39:05.731418615Z W0313 10:39:05.731336 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io) 2026-03-13T10:39:05.731418615Z E0313 10:39:05.731404 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io)" 2026-03-13T10:39:07.473177427Z W0313 10:39:07.473016 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T10:39:07.473177427Z E0313 10:39:07.473104 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T10:39:07.473479436Z W0313 10:39:07.473173 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io) 2026-03-13T10:39:07.473479436Z E0313 10:39:07.473195 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io)" 2026-03-13T10:39:19.860476441Z W0313 10:39:19.860399 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io) 2026-03-13T10:39:19.860521223Z E0313 10:39:19.860468 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io)" 2026-03-13T10:39:20.338927178Z W0313 10:39:20.338861 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io) 2026-03-13T10:39:20.338981480Z E0313 10:39:20.338922 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io)" 2026-03-13T10:39:23.811858751Z W0313 10:39:23.811757 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io) 2026-03-13T10:39:23.811858751Z E0313 10:39:23.811827 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io)" 2026-03-13T10:39:27.220029780Z W0313 10:39:27.219904 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io) 2026-03-13T10:39:27.220069971Z E0313 10:39:27.219999 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io)" 2026-03-13T10:39:28.350523765Z W0313 10:39:28.350473 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T10:39:28.350678179Z E0313 10:39:28.350658 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T10:39:28.812106826Z W0313 10:39:28.811957 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io) 2026-03-13T10:39:28.812106826Z E0313 10:39:28.812016 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io)" 2026-03-13T10:39:53.948034160Z W0313 10:39:53.947985 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io) 2026-03-13T10:39:53.948065671Z E0313 10:39:53.948042 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io)" 2026-03-13T10:39:55.258819696Z W0313 10:39:55.247260 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io) 2026-03-13T10:39:55.258819696Z E0313 10:39:55.247318 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io)" 2026-03-13T10:39:56.666783852Z W0313 10:39:56.666690 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T10:39:56.666783852Z E0313 10:39:56.666749 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T10:39:58.294047360Z W0313 10:39:58.293954 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io) 2026-03-13T10:39:58.294047360Z E0313 10:39:58.294013 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io)" 2026-03-13T10:40:00.858473249Z W0313 10:40:00.858399 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io) 2026-03-13T10:40:00.858510580Z E0313 10:40:00.858462 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io)" 2026-03-13T10:40:04.257119447Z W0313 10:40:04.257016 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io) 2026-03-13T10:40:04.257191719Z E0313 10:40:04.257112 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io)" 2026-03-13T10:40:29.462507985Z W0313 10:40:29.462421 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T10:40:29.462507985Z E0313 10:40:29.462485 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T10:40:40.569954128Z W0313 10:40:40.569844 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io) 2026-03-13T10:40:40.569954128Z E0313 10:40:40.569906 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io)" 2026-03-13T10:40:42.318282340Z W0313 10:40:42.318218 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io) 2026-03-13T10:40:42.318336561Z E0313 10:40:42.318282 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io)" 2026-03-13T10:40:50.949861694Z W0313 10:40:50.949802 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io) 2026-03-13T10:40:50.949898465Z E0313 10:40:50.949857 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io)" 2026-03-13T10:40:54.079859284Z W0313 10:40:54.079768 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io) 2026-03-13T10:40:54.079859284Z E0313 10:40:54.079827 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io)" 2026-03-13T10:40:58.182035080Z W0313 10:40:58.181956 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io) 2026-03-13T10:40:58.182035080Z E0313 10:40:58.182024 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io)" 2026-03-13T10:41:00.324970015Z W0313 10:41:00.324918 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T10:41:00.325084138Z E0313 10:41:00.325067 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T10:41:15.864555367Z W0313 10:41:15.864440 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io) 2026-03-13T10:41:15.864555367Z E0313 10:41:15.864528 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io)" controller-manager_previous.log0000640000000000000000000003425715154764724034154 0ustar0000000000000000config/pod/openshift-controller-manager/logs/controller-manager-6954c8766d-g8z482026-03-13T10:36:44.913967905Z I0313 10:36:44.913856 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T10:36:44.914476458Z I0313 10:36:44.914445 1 controller_manager.go:40] Starting controllers on 0.0.0.0:8443 (4.18.0-202602132343.p2.g8ee7440.assembly.stream.el9-8ee7440) 2026-03-13T10:36:44.917358316Z I0313 10:36:44.917258 1 controller_manager.go:51] DeploymentConfig controller using images from "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:52d35a623b99c6bcbb2c39fe834fa8442859edfcdd2dfcfcc748847f38303d16" 2026-03-13T10:36:44.917358316Z I0313 10:36:44.917273 1 controller_manager.go:57] Build controller using images from "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2e95c47e9d229d538880de371742951f83291138cfc15ccc5f2558a20bb1936e" 2026-03-13T10:36:44.917376567Z I0313 10:36:44.917370 1 leaderelection.go:254] attempting to acquire leader lease openshift-controller-manager/openshift-master-controllers... 2026-03-13T10:36:44.917448709Z I0313 10:36:44.917419 1 standalone_apiserver.go:108] Started health checks at 0.0.0.0:8443 2026-03-13T10:36:44.996345078Z I0313 10:36:44.996164 1 leaderelection.go:268] successfully acquired lease openshift-controller-manager/openshift-master-controllers 2026-03-13T10:36:44.996709138Z I0313 10:36:44.996645 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-controller-manager", Name:"openshift-master-controllers", UID:"437e80b6-65b9-490b-9514-53d78e4436d1", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"6984", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' controller-manager-6954c8766d-g8z48 became leader 2026-03-13T10:36:45.008651500Z I0313 10:36:45.008534 1 controller_manager.go:146] Starting "openshift.io/image-import" 2026-03-13T10:36:45.111316402Z I0313 10:36:45.111234 1 imagestream_controller.go:66] Starting image stream controller 2026-03-13T10:36:45.122249237Z I0313 10:36:45.122028 1 controller_manager.go:156] Started "openshift.io/image-import" 2026-03-13T10:36:45.122249237Z I0313 10:36:45.122079 1 controller_manager.go:146] Starting "openshift.io/templateinstance" 2026-03-13T10:36:45.123165292Z I0313 10:36:45.123120 1 scheduled_image_controller.go:68] Starting scheduled import controller 2026-03-13T10:36:45.763532757Z I0313 10:36:45.762971 1 controller_manager.go:156] Started "openshift.io/templateinstance" 2026-03-13T10:36:45.763532757Z I0313 10:36:45.763016 1 controller_manager.go:146] Starting "openshift.io/image-puller-rolebindings" 2026-03-13T10:36:45.950678929Z I0313 10:36:45.949823 1 controller_manager.go:156] Started "openshift.io/image-puller-rolebindings" 2026-03-13T10:36:45.950678929Z I0313 10:36:45.949849 1 controller_manager.go:146] Starting "openshift.io/unidling" 2026-03-13T10:36:45.950678929Z I0313 10:36:45.950055 1 defaultrolebindings.go:154] Starting ImagePullerRoleBindingController 2026-03-13T10:36:45.950678929Z I0313 10:36:45.950068 1 shared_informer.go:313] Waiting for caches to sync for ImagePullerRoleBindingController 2026-03-13T10:36:46.172037814Z I0313 10:36:46.170855 1 controller_manager.go:156] Started "openshift.io/unidling" 2026-03-13T10:36:46.172037814Z I0313 10:36:46.170886 1 controller_manager.go:146] Starting "openshift.io/build" 2026-03-13T10:36:46.395771493Z W0313 10:36:46.395675 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Event: events is forbidden: User "system:serviceaccount:openshift-infra:unidling-controller" cannot list resource "events" in API group "" at the cluster scope 2026-03-13T10:36:46.395771493Z E0313 10:36:46.395739 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Event: failed to list *v1.Event: events is forbidden: User \"system:serviceaccount:openshift-infra:unidling-controller\" cannot list resource \"events\" in API group \"\" at the cluster scope" 2026-03-13T10:36:46.875673266Z I0313 10:36:46.872611 1 controller_manager.go:156] Started "openshift.io/build" 2026-03-13T10:36:46.875673266Z I0313 10:36:46.872654 1 controller_manager.go:146] Starting "openshift.io/deployer-rolebindings" 2026-03-13T10:36:47.279656720Z I0313 10:36:47.276865 1 controller_manager.go:156] Started "openshift.io/deployer-rolebindings" 2026-03-13T10:36:47.279656720Z I0313 10:36:47.276897 1 controller_manager.go:146] Starting "openshift.io/image-trigger" 2026-03-13T10:36:47.279656720Z I0313 10:36:47.277128 1 defaultrolebindings.go:154] Starting DeployerRoleBindingController 2026-03-13T10:36:47.279656720Z I0313 10:36:47.277138 1 shared_informer.go:313] Waiting for caches to sync for DeployerRoleBindingController 2026-03-13T10:36:47.849960204Z I0313 10:36:47.849382 1 controller_manager.go:156] Started "openshift.io/image-trigger" 2026-03-13T10:36:47.849960204Z I0313 10:36:47.849417 1 controller_manager.go:146] Starting "openshift.io/origin-namespace" 2026-03-13T10:36:47.849960204Z I0313 10:36:47.849706 1 image_trigger_controller.go:229] Starting trigger controller 2026-03-13T10:36:47.885803962Z I0313 10:36:47.885736 1 controller_manager.go:156] Started "openshift.io/origin-namespace" 2026-03-13T10:36:47.885902205Z I0313 10:36:47.885888 1 controller_manager.go:146] Starting "openshift.io/builder-rolebindings" 2026-03-13T10:36:47.893242393Z I0313 10:36:47.893155 1 controller_manager.go:156] Started "openshift.io/builder-rolebindings" 2026-03-13T10:36:47.893242393Z I0313 10:36:47.893191 1 controller_manager.go:146] Starting "openshift.io/serviceaccount-pull-secrets" 2026-03-13T10:36:47.893428978Z I0313 10:36:47.893403 1 defaultrolebindings.go:154] Starting BuilderRoleBindingController 2026-03-13T10:36:47.893428978Z I0313 10:36:47.893421 1 shared_informer.go:313] Waiting for caches to sync for BuilderRoleBindingController 2026-03-13T10:36:47.925220946Z I0313 10:36:47.925134 1 controller_manager.go:156] Started "openshift.io/serviceaccount-pull-secrets" 2026-03-13T10:36:47.925220946Z I0313 10:36:47.925169 1 controller_manager.go:146] Starting "openshift.io/builder-serviceaccount" 2026-03-13T10:36:47.925450662Z I0313 10:36:47.925403 1 registry_urls_observation_controller.go:140] "Starting controller" name="openshift.io/internal-image-registry-pull-secrets_urls" 2026-03-13T10:36:47.925450662Z I0313 10:36:47.925443 1 image_pull_secret_controller.go:372] "Starting controller" name="openshift.io/internal-image-registry-pull-secrets_image-pull-secret" 2026-03-13T10:36:47.925465752Z I0313 10:36:47.925446 1 shared_informer.go:313] Waiting for caches to sync for openshift.io/internal-image-registry-pull-secrets_urls 2026-03-13T10:36:47.925465752Z I0313 10:36:47.925461 1 shared_informer.go:313] Waiting for caches to sync for openshift.io/internal-image-registry-pull-secrets_image-pull-secret 2026-03-13T10:36:47.925503763Z I0313 10:36:47.925417 1 legacy_image_pull_secret_controller.go:131] "Starting controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-image-pull-secret" 2026-03-13T10:36:47.925503763Z I0313 10:36:47.925487 1 keyid_observation_controller.go:164] "Starting controller" name="openshift.io/internal-image-registry-pull-secrets_kids" 2026-03-13T10:36:47.925503763Z I0313 10:36:47.925492 1 shared_informer.go:313] Waiting for caches to sync for openshift.io/internal-image-registry-pull-secrets_legacy-image-pull-secret 2026-03-13T10:36:47.925568265Z I0313 10:36:47.925507 1 service_account_controller.go:339] "Starting controller" name="openshift.io/internal-image-registry-pull-secrets_service-account" 2026-03-13T10:36:47.925568265Z I0313 10:36:47.925514 1 shared_informer.go:313] Waiting for caches to sync for openshift.io/internal-image-registry-pull-secrets_service-account 2026-03-13T10:36:47.925568265Z I0313 10:36:47.925494 1 shared_informer.go:313] Waiting for caches to sync for openshift.io/internal-image-registry-pull-secrets_kids 2026-03-13T10:36:47.925634697Z I0313 10:36:47.925423 1 legacy_token_secret_controller.go:103] "Starting controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-token-secret" 2026-03-13T10:36:47.925688528Z I0313 10:36:47.925676 1 shared_informer.go:313] Waiting for caches to sync for openshift.io/internal-image-registry-pull-secrets_legacy-token-secret 2026-03-13T10:36:47.952186784Z W0313 10:36:47.952132 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Event: events is forbidden: User "system:serviceaccount:openshift-infra:unidling-controller" cannot list resource "events" in API group "" at the cluster scope 2026-03-13T10:36:47.952363269Z E0313 10:36:47.952347 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Event: failed to list *v1.Event: events is forbidden: User \"system:serviceaccount:openshift-infra:unidling-controller\" cannot list resource \"events\" in API group \"\" at the cluster scope" 2026-03-13T10:36:47.959738148Z I0313 10:36:47.959698 1 controller_manager.go:156] Started "openshift.io/builder-serviceaccount" 2026-03-13T10:36:47.959822160Z I0313 10:36:47.959808 1 controller_manager.go:146] Starting "openshift.io/build-config-change" 2026-03-13T10:36:47.960093617Z I0313 10:36:47.960061 1 serviceaccounts_controller.go:114] "Starting service account controller" 2026-03-13T10:36:47.960134598Z I0313 10:36:47.960125 1 shared_informer.go:313] Waiting for caches to sync for service account 2026-03-13T10:36:47.988323699Z I0313 10:36:47.988235 1 controller_manager.go:156] Started "openshift.io/build-config-change" 2026-03-13T10:36:47.988323699Z I0313 10:36:47.988263 1 controller_manager.go:146] Starting "openshift.io/deployer-serviceaccount" 2026-03-13T10:36:47.997027574Z I0313 10:36:47.996965 1 controller_manager.go:156] Started "openshift.io/deployer-serviceaccount" 2026-03-13T10:36:47.997124867Z I0313 10:36:47.997112 1 controller_manager.go:146] Starting "openshift.io/deployer" 2026-03-13T10:36:47.997358323Z I0313 10:36:47.997339 1 serviceaccounts_controller.go:114] "Starting service account controller" 2026-03-13T10:36:47.997403384Z I0313 10:36:47.997392 1 shared_informer.go:313] Waiting for caches to sync for service account 2026-03-13T10:36:48.024964478Z I0313 10:36:48.024894 1 controller_manager.go:156] Started "openshift.io/deployer" 2026-03-13T10:36:48.024964478Z I0313 10:36:48.024930 1 controller_manager.go:146] Starting "openshift.io/deploymentconfig" 2026-03-13T10:36:48.025178064Z I0313 10:36:48.025141 1 factory.go:73] Starting deployer controller 2026-03-13T10:36:48.058994787Z I0313 10:36:48.058920 1 controller_manager.go:156] Started "openshift.io/deploymentconfig" 2026-03-13T10:36:48.058994787Z I0313 10:36:48.058951 1 controller_manager.go:146] Starting "openshift.io/serviceaccount" 2026-03-13T10:36:48.058994787Z I0313 10:36:48.058959 1 serviceaccount.go:16] openshift.io/serviceaccount: no managed names specified 2026-03-13T10:36:48.058994787Z W0313 10:36:48.058967 1 controller_manager.go:153] Skipping "openshift.io/serviceaccount" 2026-03-13T10:36:48.058994787Z W0313 10:36:48.058976 1 controller_manager.go:143] "openshift.io/default-rolebindings" is disabled 2026-03-13T10:36:48.058994787Z I0313 10:36:48.058983 1 controller_manager.go:146] Starting "openshift.io/image-signature-import" 2026-03-13T10:36:48.059923962Z I0313 10:36:48.059222 1 factory.go:78] Starting deploymentconfig controller 2026-03-13T10:36:48.062275635Z I0313 10:36:48.061817 1 controller_manager.go:156] Started "openshift.io/image-signature-import" 2026-03-13T10:36:48.062275635Z I0313 10:36:48.061838 1 controller_manager.go:146] Starting "openshift.io/templateinstancefinalizer" 2026-03-13T10:36:50.252474266Z W0313 10:36:50.252380 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Event: events is forbidden: User "system:serviceaccount:openshift-infra:unidling-controller" cannot list resource "events" in API group "" at the cluster scope 2026-03-13T10:36:50.252474266Z E0313 10:36:50.252457 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Event: failed to list *v1.Event: events is forbidden: User \"system:serviceaccount:openshift-infra:unidling-controller\" cannot list resource \"events\" in API group \"\" at the cluster scope" 2026-03-13T10:36:55.096536340Z W0313 10:36:55.096431 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Event: events is forbidden: User "system:serviceaccount:openshift-infra:unidling-controller" cannot list resource "events" in API group "" at the cluster scope 2026-03-13T10:36:55.096536340Z E0313 10:36:55.096505 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Event: failed to list *v1.Event: events is forbidden: User \"system:serviceaccount:openshift-infra:unidling-controller\" cannot list resource \"events\" in API group \"\" at the cluster scope" 2026-03-13T10:37:02.644614774Z W0313 10:37:02.644500 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Event: events is forbidden: User "system:serviceaccount:openshift-infra:unidling-controller" cannot list resource "events" in API group "" at the cluster scope 2026-03-13T10:37:02.644614774Z E0313 10:37:02.644568 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Event: failed to list *v1.Event: events is forbidden: User \"system:serviceaccount:openshift-infra:unidling-controller\" cannot list resource \"events\" in API group \"\" at the cluster scope" 2026-03-13T10:37:22.088911218Z F0313 10:37:22.088815 1 controller_manager.go:149] Error starting "openshift.io/templateinstancefinalizer" (Timeout: request did not complete within requested timeout - context deadline exceeded) config/pod/openshift-controller-manager/controller-manager-6954c8766d-g8z48.json0000640000000000000000000002175615154764724025730 0ustar0000000000000000{"metadata":{"name":"controller-manager-6954c8766d-g8z48","generateName":"controller-manager-6954c8766d-","namespace":"openshift-controller-manager","uid":"6317b62a-46e2-4a45-9c29-cb04c40d4425","resourceVersion":"7355","creationTimestamp":"2026-03-13T10:36:32Z","labels":{"app":"openshift-controller-manager-a","controller-manager":"true","openshift-route-controller-manager-anti-affinity":"true","pod-template-hash":"6954c8766d"},"annotations":{"configmaps/client-ca":"6477","configmaps/config":"6467","configmaps/openshift-global-ca":"4331","configmaps/openshift-service-ca":"5688","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.43/23\"],\"mac_address\":\"0a:58:0a:80:00:2b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.43/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.43\"\n ],\n \"mac\": \"0a:58:0a:80:00:2b\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","openshiftcontrollermanagers.operator.openshift.io/cluster":"2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"controller-manager-6954c8766d","uid":"e5cadca6-d2d9-4906-97bb-0f18d710187a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"config","defaultMode":420}},{"name":"client-ca","configMap":{"name":"client-ca","defaultMode":420}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420}},{"name":"proxy-ca-bundles","configMap":{"name":"openshift-global-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"kube-api-access-2d8dd","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5","command":["openshift-controller-manager","start"],"args":["--config=/var/run/configmaps/config/config.yaml","-v=2"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"100m","memory":"100Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"proxy-ca-bundles","mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"kube-api-access-2d8dd","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":10},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000560000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-sa","serviceAccount":"openshift-controller-manager-sa","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c24,c4"},"runAsNonRoot":true,"fsGroup":1000560000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"app":"openshift-controller-manager-a","controller-manager":"true","openshift-route-controller-manager-anti-affinity":"true"}},"topologyKey":"kubernetes.io/hostname"}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:45Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:43Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:43Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.43","podIPs":[{"ip":"10.128.0.43"}],"startTime":"2026-03-13T10:36:36Z","containerStatuses":[{"name":"controller-manager","state":{"running":{"startedAt":"2026-03-13T10:38:27Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":":50.252380 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Event: events is forbidden: User \"system:serviceaccount:openshift-infra:unidling-controller\" cannot list resource \"events\" in API group \"\" at the cluster scope\nE0313 10:36:50.252457 1 reflector.go:158] \"Unhandled Error\" err=\"k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Event: failed to list *v1.Event: events is forbidden: User \\\"system:serviceaccount:openshift-infra:unidling-controller\\\" cannot list resource \\\"events\\\" in API group \\\"\\\" at the cluster scope\"\nW0313 10:36:55.096431 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Event: events is forbidden: User \"system:serviceaccount:openshift-infra:unidling-controller\" cannot list resource \"events\" in API group \"\" at the cluster scope\nE0313 10:36:55.096505 1 reflector.go:158] \"Unhandled Error\" err=\"k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Event: failed to list *v1.Event: events is forbidden: User \\\"system:serviceaccount:openshift-infra:unidling-controller\\\" cannot list resource \\\"events\\\" in API group \\\"\\\" at the cluster scope\"\nW0313 10:37:02.644500 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Event: events is forbidden: User \"system:serviceaccount:openshift-infra:unidling-controller\" cannot list resource \"events\" in API group \"\" at the cluster scope\nE0313 10:37:02.644568 1 reflector.go:158] \"Unhandled Error\" err=\"k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Event: failed to list *v1.Event: events is forbidden: User \\\"system:serviceaccount:openshift-infra:unidling-controller\\\" cannot list resource \\\"events\\\" in API group \\\"\\\" at the cluster scope\"\nF0313 10:37:22.088815 1 controller_manager.go:149] Error starting \"openshift.io/templateinstancefinalizer\" (Timeout: request did not complete within requested timeout - context deadline exceeded)\n","startedAt":"2026-03-13T10:36:44Z","finishedAt":"2026-03-13T10:37:22Z","containerID":"cri-o://e071f5df1cf13730e7c3a2d7e673c1b7527862b8e1f69ed525efba676776f319"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5","containerID":"cri-o://531f8d3aa930e35bb9ee67f1aa93559ea0aeef92bc7b549aec79dcf9206d8e53","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"proxy-ca-bundles","mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"kube-api-access-2d8dd","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator_current.log0000640000000000000000000001021115154764724045252 0ustar0000000000000000config/pod/openshift-controller-manager-operator/logs/openshift-controller-manager-operator-8565d84698-nsg742026-03-13T10:38:43.912287298Z I0313 10:38:43.911550 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T10:38:43.912491254Z I0313 10:38:43.912461 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T10:38:43.913087972Z I0313 10:38:43.913036 1 observer_polling.go:159] Starting file observer 2026-03-13T10:38:43.955357645Z I0313 10:38:43.954719 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202602132343.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254 2026-03-13T10:38:44.614815954Z I0313 10:38:44.614736 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T10:38:44.614815954Z W0313 10:38:44.614780 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:38:44.614815954Z W0313 10:38:44.614786 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:38:44.614815954Z W0313 10:38:44.614790 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T10:38:44.614815954Z W0313 10:38:44.614794 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T10:38:44.614815954Z W0313 10:38:44.614797 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T10:38:44.614815954Z W0313 10:38:44.614801 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T10:38:44.617509715Z I0313 10:38:44.617233 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T10:38:44.617509715Z I0313 10:38:44.617318 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T10:38:44.617509715Z I0313 10:38:44.617368 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T10:38:44.617509715Z I0313 10:38:44.617431 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:38:44.617509715Z I0313 10:38:44.617450 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:38:44.617509715Z I0313 10:38:44.617471 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T10:38:44.617509715Z I0313 10:38:44.617496 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:38:44.617923808Z I0313 10:38:44.617639 1 leaderelection.go:254] attempting to acquire leader lease openshift-controller-manager-operator/openshift-controller-manager-operator-lock... 2026-03-13T10:38:44.617923808Z I0313 10:38:44.617770 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T10:38:44.617923808Z I0313 10:38:44.617833 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T10:38:44.618895597Z I0313 10:38:44.617945 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T10:38:44.717827931Z I0313 10:38:44.717739 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:38:44.717827931Z I0313 10:38:44.717795 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T10:38:44.718004236Z I0313 10:38:44.717978 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file openshift-controller-manager-operator_previous.log0000640000000000000000000000250415154764724045452 0ustar0000000000000000config/pod/openshift-controller-manager-operator/logs/openshift-controller-manager-operator-8565d84698-nsg742026-03-13T10:37:02.785035944Z I0313 10:37:02.784833 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T10:37:02.785202449Z I0313 10:37:02.785020 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T10:37:02.785554738Z I0313 10:37:02.785481 1 observer_polling.go:159] Starting file observer 2026-03-13T10:38:02.793142460Z W0313 10:38:02.793053 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-controller-manager-operator-8565d84698-nsg74) 2026-03-13T10:38:02.793345936Z I0313 10:38:02.793311 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202602132343.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254 2026-03-13T10:38:33.058079775Z F0313 10:38:33.057921 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-controller-manager-operator/leases/openshift-controller-manager-operator-lock": context deadline exceeded openshift-controller-manager-operator-8565d84698-nsg74.json0000640000000000000000000001661315154764724033327 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-8565d84698-nsg74","generateName":"openshift-controller-manager-operator-8565d84698-","namespace":"openshift-controller-manager-operator","uid":"282bc9ff-1bc0-421b-9cd3-d88d7c5e5303","resourceVersion":"7393","creationTimestamp":"2026-03-13T10:33:25Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"8565d84698"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.10/23\"],\"mac_address\":\"0a:58:0a:80:00:0a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.10/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.10\"\n ],\n \"mac\": \"0a:58:0a:80:00:0a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-8565d84698","uid":"7f064a44-22cd-4d87-aa4d-4e41eda9e5a1","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-lpdlr","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-lpdlr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c0"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:46Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.10","podIPs":[{"ip":"10.128.0.10"}],"startTime":"2026-03-13T10:35:36Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-03-13T10:38:43Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0313 10:37:02.784833 1 cmd.go:253] Using service-serving-cert provided certificates\nI0313 10:37:02.785020 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0313 10:37:02.785481 1 observer_polling.go:159] Starting file observer\nW0313 10:38:02.793053 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-controller-manager-operator-8565d84698-nsg74)\nI0313 10:38:02.793311 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202602132343.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254\nF0313 10:38:33.057921 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-controller-manager-operator/leases/openshift-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-13T10:37:02Z","finishedAt":"2026-03-13T10:38:33Z","containerID":"cri-o://53a8fd339624b3a824ba77b1d93455581709099722d103fd93b0ffb255eebf03"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","containerID":"cri-o://44045eb34dbce8a8d8c5bec28be559a0d562acea9909308b142b2b5b5860a229","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-lpdlr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-df8wr/etcd-operator_current.log0000640000000000000000000001055315154764724031163 0ustar00000000000000002026-03-13T10:38:44.011117448Z I0313 10:38:44.010742 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-03-13T10:38:44.011556121Z I0313 10:38:44.011485 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T10:38:44.011653314Z I0313 10:38:44.011606 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T10:38:44.011761207Z I0313 10:38:44.011723 1 observer_polling.go:159] Starting file observer 2026-03-13T10:38:44.015183661Z I0313 10:38:44.015113 1 observer_polling.go:159] Starting file observer 2026-03-13T10:38:44.080442432Z I0313 10:38:44.080343 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602170912.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934 2026-03-13T10:38:45.486092911Z I0313 10:38:45.105575 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T10:38:45.486092911Z W0313 10:38:45.105628 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:38:45.486092911Z W0313 10:38:45.105634 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:38:45.486092911Z W0313 10:38:45.105638 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T10:38:45.486092911Z W0313 10:38:45.105642 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T10:38:45.486092911Z W0313 10:38:45.105645 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T10:38:45.486092911Z W0313 10:38:45.105647 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T10:38:45.492523326Z I0313 10:38:45.492451 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T10:38:45.492936189Z I0313 10:38:45.492917 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... 2026-03-13T10:38:45.493884698Z I0313 10:38:45.493859 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T10:38:45.493922839Z I0313 10:38:45.493904 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T10:38:45.493948189Z I0313 10:38:45.493934 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T10:38:45.493983661Z I0313 10:38:45.493965 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T10:38:45.494103064Z I0313 10:38:45.494082 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T10:38:45.494197307Z I0313 10:38:45.494181 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:38:45.494197307Z I0313 10:38:45.494191 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:38:45.494227678Z I0313 10:38:45.494203 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T10:38:45.494227678Z I0313 10:38:45.494213 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:38:45.594814811Z I0313 10:38:45.594635 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:38:45.594814811Z I0313 10:38:45.594752 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T10:38:45.594949735Z I0313 10:38:45.594894 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-df8wr/etcd-operator_previous.log0000640000000000000000000004253615154764724031363 0ustar00000000000000002026-03-13T10:37:56.703618060Z I0313 10:37:56.703613 1 controller_manager.go:54] GuardController controller terminated 2026-03-13T10:37:56.703639341Z I0313 10:37:56.703628 1 base_controller.go:123] Shutting down worker of etcd controller ... 2026-03-13T10:37:56.703651911Z I0313 10:37:56.703642 1 base_controller.go:113] All etcd workers have been terminated 2026-03-13T10:37:56.703665332Z I0313 10:37:56.703502 1 base_controller.go:181] Shutting down StatusSyncer_etcd ... 2026-03-13T10:37:56.703665332Z I0313 10:37:56.703660 1 base_controller.go:159] All StatusSyncer_etcd post start hooks have been terminated 2026-03-13T10:37:56.703781465Z I0313 10:37:56.703745 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-13T10:37:56.703853248Z I0313 10:37:56.703803 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:37:56.703869828Z I0313 10:37:56.703852 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-13T10:37:56.703906969Z I0313 10:37:56.703873 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-13T10:37:56.703906969Z I0313 10:37:56.703882 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-13T10:37:56.703920840Z I0313 10:37:56.703905 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T10:37:56.703968671Z E0313 10:37:56.703946 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_etcd reconciliation failed: Put \"https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/etcd/status\": context canceled" 2026-03-13T10:37:56.704017283Z I0313 10:37:56.703976 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-13T10:37:56.704091965Z I0313 10:37:56.704072 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T10:37:56.704156337Z I0313 10:37:56.704116 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-3636525143/tls.crt::/tmp/serving-cert-3636525143/tls.key" 2026-03-13T10:37:56.704207768Z I0313 10:37:56.703852 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T10:37:56.704254400Z I0313 10:37:56.704198 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-13T10:37:56.704390784Z I0313 10:37:56.704333 1 base_controller.go:181] Shutting down PruneController ... 2026-03-13T10:37:56.704390784Z I0313 10:37:56.704356 1 base_controller.go:181] Shutting down etcd-StaticPodState ... 2026-03-13T10:37:56.704442835Z I0313 10:37:56.704010 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-13T10:37:56.704525968Z I0313 10:37:56.704470 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-13T10:37:56.704525968Z I0313 10:37:56.704505 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-13T10:37:56.704525968Z E0313 10:37:56.704510 1 base_controller.go:279] "Unhandled Error" err="EtcdCertSignerController reconciliation failed: could not get current etcd-all-bundles configmap Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-all-bundles\": context canceled" 2026-03-13T10:37:56.704525968Z I0313 10:37:56.704518 1 controller_manager.go:54] PruneController controller terminated 2026-03-13T10:37:56.704620111Z I0313 10:37:56.704571 1 base_controller.go:113] All DefragController workers have been terminated 2026-03-13T10:37:56.704620111Z I0313 10:37:56.704575 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T10:37:56.704620111Z E0313 10:37:56.704504 1 base_controller.go:279] "Unhandled Error" err="etcd-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"etcd-StaticPodState\": Patch \"https://172.30.0.1:443/apis/operator.openshift.io/v1/etcds/cluster/status?fieldManager=etcd-StaticPodState&force=true\": context canceled" 2026-03-13T10:37:56.704620111Z I0313 10:37:56.704615 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T10:37:56.704642622Z I0313 10:37:56.704087 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-13T10:37:56.704642622Z I0313 10:37:56.704623 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-13T10:37:56.704656682Z I0313 10:37:56.704609 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-13T10:37:56.704656682Z I0313 10:37:56.704645 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-13T10:37:56.704656682Z I0313 10:37:56.704652 1 controller_manager.go:54] RevisionController controller terminated 2026-03-13T10:37:56.704752265Z I0313 10:37:56.704695 1 base_controller.go:113] All Installer workers have been terminated 2026-03-13T10:37:56.704752265Z I0313 10:37:56.704714 1 controller_manager.go:54] Installer controller terminated 2026-03-13T10:37:56.704752265Z I0313 10:37:56.704720 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-13T10:37:56.704752265Z I0313 10:37:56.704697 1 base_controller.go:123] Shutting down worker of etcd-InstallerState controller ... 2026-03-13T10:37:56.704752265Z I0313 10:37:56.704731 1 builder.go:335] server exited 2026-03-13T10:37:56.704752265Z I0313 10:37:56.704742 1 base_controller.go:113] All etcd-InstallerState workers have been terminated 2026-03-13T10:37:56.704842498Z I0313 10:37:56.704815 1 base_controller.go:123] Shutting down worker of ScriptController controller ... 2026-03-13T10:37:56.704842498Z I0313 10:37:56.704836 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-13T10:37:56.704860218Z I0313 10:37:56.704840 1 base_controller.go:113] All ScriptController workers have been terminated 2026-03-13T10:37:56.704860218Z I0313 10:37:56.704849 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-13T10:37:56.704860218Z I0313 10:37:56.704855 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-13T10:37:56.705055714Z I0313 10:37:56.705032 1 base_controller.go:123] Shutting down worker of StatusSyncer_etcd controller ... 2026-03-13T10:37:56.705125836Z I0313 10:37:56.705109 1 base_controller.go:113] All StatusSyncer_etcd workers have been terminated 2026-03-13T10:37:56.706248080Z E0313 10:37:56.705308 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-13T10:37:56.706248080Z E0313 10:37:56.706082 1 base_controller.go:279] "Unhandled Error" err="EtcdStaticResources-StaticResources reconciliation failed: [\"etcd/backups-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts etcd-backup-sa), \"etcd/backups-cr.yaml\" (string): Get \"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/clusterroles/system:openshift:operator:etcd-backup-role\": context canceled, \"etcd/backups-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"EtcdStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T10:37:56.706248080Z I0313 10:37:56.706141 1 base_controller.go:123] Shutting down worker of EtcdCertSignerController controller ... 2026-03-13T10:37:56.706248080Z I0313 10:37:56.706167 1 base_controller.go:113] All EtcdCertSignerController workers have been terminated 2026-03-13T10:37:56.706248080Z I0313 10:37:56.706198 1 base_controller.go:123] Shutting down worker of etcd-StaticPodState controller ... 2026-03-13T10:37:56.706248080Z I0313 10:37:56.706214 1 base_controller.go:113] All etcd-StaticPodState workers have been terminated 2026-03-13T10:37:56.706248080Z I0313 10:37:56.706224 1 controller_manager.go:54] etcd-StaticPodState controller terminated 2026-03-13T10:37:56.706439106Z E0313 10:37:56.706388 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa), \"manifests/installer-cluster-rolebinding.yaml\" (string): Get \"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:operator:openshift-etcd-installer\": context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T10:37:56.706439106Z I0313 10:37:56.706431 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-13T10:37:56.706458357Z I0313 10:37:56.706449 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-13T10:37:56.706472067Z I0313 10:37:56.706450 1 controller_manager.go:54] etcd-InstallerState controller terminated 2026-03-13T10:37:56.707620592Z I0313 10:37:56.707544 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-13T10:37:56.707620592Z I0313 10:37:56.707574 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-13T10:37:56.707620592Z I0313 10:37:56.707578 1 base_controller.go:123] Shutting down worker of EtcdStaticResources-StaticResources controller ... 2026-03-13T10:37:56.707649733Z I0313 10:37:56.707635 1 base_controller.go:113] All EtcdStaticResources-StaticResources workers have been terminated 2026-03-13T10:37:56.707692534Z I0313 10:37:56.707581 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-13T10:38:01.263771887Z I0313 10:38:01.263715 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="309e04b9dabce821c3bf350a162691b31b7e8fcd04862af0eb2a6905ed92e62e") 2026-03-13T10:38:01.263865190Z I0313 10:38:01.263855 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.crt" changed 2026-03-13T10:38:01.263973523Z I0313 10:38:01.263959 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="1bc1a4817a2e15efade6c03a5f18b2371759f70865c20f531269a001ebd8d0c7") 2026-03-13T10:38:01.264008994Z I0313 10:38:01.263997 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.key" changed 2026-03-13T10:38:01.264093727Z I0313 10:38:01.264079 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.crt" has been modified (old="", new="78f0aa75b59bd1698c800083dad8b2a0fe13dbe8b917029ba630803a9d45dbd4") 2026-03-13T10:38:01.264129908Z I0313 10:38:01.264119 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.crt" changed 2026-03-13T10:38:01.264208160Z I0313 10:38:01.264193 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.key" has been modified (old="", new="2ccbf3a86776ef046fc6ce133982512178bc7dd21f807e4d74e4984e1a09fdd0") 2026-03-13T10:38:01.264248711Z I0313 10:38:01.264238 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.key" changed 2026-03-13T10:38:01.264441627Z I0313 10:38:01.264426 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-ca/ca-bundle.crt" has been created (hash="96ca860c1f89839c9dd44c52cc98186411e9dd90dba5770f4adaa98778ec861c") 2026-03-13T10:38:01.264475958Z I0313 10:38:01.264464 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-ca/ca-bundle.crt" changed 2026-03-13T10:38:01.264563251Z I0313 10:38:01.264548 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-service-ca/service-ca.crt" has been created (hash="1761a38ab644555002105545936d961a7fa351cc5fbab0b8794c6abd396af5dd") 2026-03-13T10:38:01.264623473Z I0313 10:38:01.264610 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-service-ca/service-ca.crt" changed 2026-03-13T10:38:01.702184175Z I0313 10:38:01.702126 1 observer_polling.go:162] Shutting down file observer 2026-03-13T10:38:08.959299915Z W0313 10:38:08.959217 1 etcdcli_pool.go:73] could not create a new cached client after 0 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-13T10:38:09.958654950Z W0313 10:38:09.958506 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-13T10:38:10.057049576Z W0313 10:38:10.056969 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-13T10:38:10.057269283Z W0313 10:38:10.057215 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-13T10:38:10.959996376Z I0313 10:38:10.959897 1 etcdcli_pool.go:70] creating a new cached client 2026-03-13T10:38:13.958786114Z I0313 10:38:13.958718 1 etcdcli_pool.go:70] creating a new cached client 2026-03-13T10:38:14.057634884Z I0313 10:38:14.057528 1 etcdcli_pool.go:70] creating a new cached client 2026-03-13T10:38:14.057634884Z I0313 10:38:14.057558 1 etcdcli_pool.go:70] creating a new cached client 2026-03-13T10:38:19.744127218Z E0313 10:38:19.744022 1 base_controller.go:279] "Unhandled Error" err="EtcdEndpointsController reconciliation failed: failed to get member list: context canceled" 2026-03-13T10:38:19.744127218Z I0313 10:38:19.744097 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"16ba4147-ed20-43e0-84f7-16287cf57d6d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'EtcdEndpointsErrorUpdatingStatus' client rate limiter Wait returned an error: context canceled 2026-03-13T10:38:19.745421477Z E0313 10:38:19.744267 1 base_controller.go:279] "Unhandled Error" err="BootstrapTeardownController reconciliation failed: error while canRemoveEtcdBootstrap: context canceled" 2026-03-13T10:38:19.745421477Z E0313 10:38:19.744914 1 base_controller.go:279] "Unhandled Error" err="EtcdMembersController reconciliation failed: context canceled" 2026-03-13T10:38:19.745421477Z I0313 10:38:19.745013 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"16ba4147-ed20-43e0-84f7-16287cf57d6d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ReportEtcdMembersErrorUpdatingStatus' client rate limiter Wait returned an error: context canceled 2026-03-13T10:38:19.745421477Z I0313 10:38:19.745130 1 base_controller.go:123] Shutting down worker of EtcdEndpointsController controller ... 2026-03-13T10:38:19.745421477Z I0313 10:38:19.745152 1 base_controller.go:113] All EtcdEndpointsController workers have been terminated 2026-03-13T10:38:19.745636634Z I0313 10:38:19.745611 1 base_controller.go:123] Shutting down worker of BootstrapTeardownController controller ... 2026-03-13T10:38:19.745657564Z I0313 10:38:19.745652 1 base_controller.go:113] All BootstrapTeardownController workers have been terminated 2026-03-13T10:38:19.746685845Z I0313 10:38:19.746657 1 base_controller.go:123] Shutting down worker of EtcdMembersController controller ... 2026-03-13T10:38:19.746704796Z I0313 10:38:19.746686 1 base_controller.go:113] All EtcdMembersController workers have been terminated 2026-03-13T10:38:19.891376846Z W0313 10:38:19.891300 1 base_controller.go:242] Updating status of "ClusterMemberController" failed: unable to ApplyStatus for operator using fieldManager "ClusterMemberController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-13T10:38:19.891376846Z E0313 10:38:19.891339 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberController reconciliation failed: could not get list of unhealthy members: could not get member list context canceled" 2026-03-13T10:38:19.892574803Z I0313 10:38:19.892538 1 base_controller.go:123] Shutting down worker of ClusterMemberController controller ... 2026-03-13T10:38:19.892604964Z I0313 10:38:19.892581 1 base_controller.go:113] All ClusterMemberController workers have been terminated 2026-03-13T10:38:30.707838553Z E0313 10:38:30.707768 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T10:38:30.707838553Z W0313 10:38:30.707813 1 leaderelection.go:84] leader election lost config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-df8wr.json0000640000000000000000000001576315154764724024105 0ustar0000000000000000{"metadata":{"name":"etcd-operator-5884b9cd56-df8wr","generateName":"etcd-operator-5884b9cd56-","namespace":"openshift-etcd-operator","uid":"574bf255-14b3-40af-b240-2d3abd5b86b8","resourceVersion":"7392","creationTimestamp":"2026-03-13T10:33:23Z","labels":{"app":"etcd-operator","pod-template-hash":"5884b9cd56"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.17/23\"],\"mac_address\":\"0a:58:0a:80:00:11\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.17/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.17\"\n ],\n \"mac\": \"0a:58:0a:80:00:11\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-5884b9cd56","uid":"85d8a9c8-6088-472e-8936-812786c6a782","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-grplv","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-grplv","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:46Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.17","podIPs":[{"ip":"10.128.0.17"}],"startTime":"2026-03-13T10:35:36Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-03-13T10:38:43Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T10:35:51Z","finishedAt":"2026-03-13T10:38:30Z","containerID":"cri-o://a384e9c9352558c7493eb0f31fbfe7c7667c323e9cd28c07e6b3e552b94e372f"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","containerID":"cri-o://5562479ec1e49b40c330a36ec4d9ac6d15b4428df0c9b17bcdf8d8cf48cf7a09","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-grplv","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000002746015154764724034226 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-65bc99cdf7-7rjbr2026-03-13T10:36:38.842141502Z W0313 10:36:38.841913 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-13T10:36:38.842488571Z I0313 10:36:38.842452 1 crypto.go:601] Generating new CA for check-endpoints-signer@1773398198 cert, and key in /tmp/serving-cert-3072495802/serving-signer.crt, /tmp/serving-cert-3072495802/serving-signer.key 2026-03-13T10:36:39.145982093Z I0313 10:36:39.145893 1 observer_polling.go:159] Starting file observer 2026-03-13T10:36:39.171205594Z I0313 10:36:39.171153 1 builder.go:304] check-endpoints version 4.18.0-202602132343.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-13T10:36:39.172167380Z I0313 10:36:39.172134 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-3072495802/tls.crt::/tmp/serving-cert-3072495802/tls.key" 2026-03-13T10:36:39.681033435Z I0313 10:36:39.680977 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-13T10:36:39.683168352Z I0313 10:36:39.683121 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-13T10:36:39.683168352Z I0313 10:36:39.683144 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-13T10:36:39.683195893Z I0313 10:36:39.683169 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-13T10:36:39.683195893Z I0313 10:36:39.683176 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-13T10:36:39.688754933Z I0313 10:36:39.688685 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T10:36:39.688754933Z W0313 10:36:39.688717 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:36:39.688754933Z W0313 10:36:39.688723 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:36:39.688754933Z W0313 10:36:39.688728 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T10:36:39.688754933Z W0313 10:36:39.688731 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T10:36:39.688754933Z W0313 10:36:39.688735 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T10:36:39.688754933Z W0313 10:36:39.688739 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T10:36:39.689103993Z I0313 10:36:39.689066 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-13T10:36:39.719192295Z I0313 10:36:39.719141 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3072495802/tls.crt::/tmp/serving-cert-3072495802/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773398198\" (2026-03-13 10:36:38 +0000 UTC to 2026-04-12 10:36:39 +0000 UTC (now=2026-03-13 10:36:39.719077202 +0000 UTC))" 2026-03-13T10:36:39.719480923Z I0313 10:36:39.719330 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773398199\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773398199\" (2026-03-13 09:36:39 +0000 UTC to 2027-03-13 09:36:39 +0000 UTC (now=2026-03-13 10:36:39.719299888 +0000 UTC))" 2026-03-13T10:36:39.719480923Z I0313 10:36:39.719352 1 secure_serving.go:213] Serving securely on [::]:17698 2026-03-13T10:36:39.721729593Z I0313 10:36:39.720432 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-3072495802/tls.crt::/tmp/serving-cert-3072495802/tls.key" 2026-03-13T10:36:39.721729593Z I0313 10:36:39.720378 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T10:36:39.721729593Z I0313 10:36:39.720506 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T10:36:39.721729593Z I0313 10:36:39.720576 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T10:36:39.721729593Z I0313 10:36:39.720649 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T10:36:39.721729593Z I0313 10:36:39.720668 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:36:39.721729593Z I0313 10:36:39.720791 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T10:36:39.721729593Z I0313 10:36:39.720801 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T10:36:39.721729593Z I0313 10:36:39.721578 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-13T10:36:39.723436859Z I0313 10:36:39.723362 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:36:39.723436859Z I0313 10:36:39.723401 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:36:39.729017540Z I0313 10:36:39.728959 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T10:36:39.729415291Z I0313 10:36:39.729377 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T10:36:39.729770820Z I0313 10:36:39.729746 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T10:36:39.760297694Z I0313 10:36:39.759908 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-03-13T10:36:39.821906927Z I0313 10:36:39.821790 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:36:39.821906927Z I0313 10:36:39.821871 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T10:36:39.822365180Z I0313 10:36:39.822340 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-13 10:24:17 +0000 UTC to 2026-03-14 10:24:17 +0000 UTC (now=2026-03-13 10:36:39.822277167 +0000 UTC))" 2026-03-13T10:36:39.822546275Z I0313 10:36:39.822533 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3072495802/tls.crt::/tmp/serving-cert-3072495802/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773398198\" (2026-03-13 10:36:38 +0000 UTC to 2026-04-12 10:36:39 +0000 UTC (now=2026-03-13 10:36:39.822517524 +0000 UTC))" 2026-03-13T10:36:39.822729440Z I0313 10:36:39.822711 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773398199\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773398199\" (2026-03-13 09:36:39 +0000 UTC to 2027-03-13 09:36:39 +0000 UTC (now=2026-03-13 10:36:39.822693179 +0000 UTC))" 2026-03-13T10:36:39.824219980Z I0313 10:36:39.824182 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:36:39.824600480Z I0313 10:36:39.824560 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 10:17:45 +0000 UTC to 2036-03-10 10:17:45 +0000 UTC (now=2026-03-13 10:36:39.824523438 +0000 UTC))" 2026-03-13T10:36:39.824614671Z I0313 10:36:39.824607 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2026-03-14 10:24:19 +0000 UTC (now=2026-03-13 10:36:39.82457868 +0000 UTC))" 2026-03-13T10:36:39.824646011Z I0313 10:36:39.824624 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2027-03-13 10:24:19 +0000 UTC (now=2026-03-13 10:36:39.824613611 +0000 UTC))" 2026-03-13T10:36:39.824658352Z I0313 10:36:39.824644 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2027-03-13 10:24:19 +0000 UTC (now=2026-03-13 10:36:39.824634621 +0000 UTC))" 2026-03-13T10:36:39.824673562Z I0313 10:36:39.824664 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 10:24:16 +0000 UTC to 2036-03-10 10:24:16 +0000 UTC (now=2026-03-13 10:36:39.824653452 +0000 UTC))" 2026-03-13T10:36:39.824718113Z I0313 10:36:39.824690 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-13 10:24:17 +0000 UTC to 2026-03-14 10:24:17 +0000 UTC (now=2026-03-13 10:36:39.824671492 +0000 UTC))" 2026-03-13T10:36:39.824916659Z I0313 10:36:39.824873 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3072495802/tls.crt::/tmp/serving-cert-3072495802/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773398198\" (2026-03-13 10:36:38 +0000 UTC to 2026-04-12 10:36:39 +0000 UTC (now=2026-03-13 10:36:39.824858647 +0000 UTC))" 2026-03-13T10:36:39.825033992Z I0313 10:36:39.824991 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773398199\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773398199\" (2026-03-13 09:36:39 +0000 UTC to 2027-03-13 09:36:39 +0000 UTC (now=2026-03-13 10:36:39.82497745 +0000 UTC))" 2026-03-13T10:36:40.738607071Z I0313 10:36:40.738499 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T10:36:40.760445611Z I0313 10:36:40.760341 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-03-13T10:36:40.760445611Z I0313 10:36:40.760388 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-65bc99cdf7-7rjbr/openshift-apiserver_current.log0000640000000000000000000004642315154764724031231 0ustar00000000000000002026-03-13T10:37:48.086227906Z E0313 10:37:48.086125 1 storage_rbac.go:232] "Unhandled Error" err="unable to reconcile clusterrole.rbac.authorization.k8s.io/system:openshift:controller:resourcequota-controller: the server was unable to return a response in the time allotted, but may still be processing the request (get clusterroles.rbac.authorization.k8s.io system:openshift:controller:resourcequota-controller)" 2026-03-13T10:37:50.875247988Z W0313 10:37:50.875071 1 logging.go:55] [core] [Channel #40 SubChannel #41]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:37:51.474757845Z W0313 10:37:51.474651 1 logging.go:55] [core] [Channel #31 SubChannel #32]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:37:52.503059910Z I0313 10:37:52.502899 1 healthz.go:278] etcd,poststarthook/authorization.openshift.io-bootstrapclusterroles check failed: livez 2026-03-13T10:37:52.503059910Z [-]etcd failed: error getting data from etcd: context deadline exceeded 2026-03-13T10:37:52.503059910Z [-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: not finished 2026-03-13T10:37:54.530691870Z W0313 10:37:54.530606 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:37:57.226073030Z W0313 10:37:57.225971 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:37:58.591031644Z W0313 10:37:58.590867 1 logging.go:55] [core] [Channel #1 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:37:59.024477201Z W0313 10:37:59.024345 1 logging.go:55] [core] [Channel #37 SubChannel #38]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:37:59.407722624Z W0313 10:37:59.407582 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:37:59.741232819Z W0313 10:37:59.741112 1 logging.go:55] [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:00.110136098Z W0313 10:38:00.109996 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:00.399393918Z W0313 10:38:00.399289 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:00.430121841Z W0313 10:38:00.430025 1 logging.go:55] [core] [Channel #43 SubChannel #44]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:00.634451843Z W0313 10:38:00.634354 1 logging.go:55] [core] [Channel #16 SubChannel #17]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:01.508534026Z I0313 10:38:01.508462 1 healthz.go:278] etcd,poststarthook/authorization.openshift.io-bootstrapclusterroles check failed: livez 2026-03-13T10:38:01.508534026Z [-]etcd failed: error getting data from etcd: context deadline exceeded 2026-03-13T10:38:01.508534026Z [-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: not finished 2026-03-13T10:38:04.590498790Z W0313 10:38:04.590438 1 logging.go:55] [core] [Channel #22 SubChannel #23]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:09.206224010Z W0313 10:38:09.206102 1 logging.go:55] [core] [Channel #48 SubChannel #49]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:10.207692499Z W0313 10:38:10.207622 1 logging.go:55] [core] [Channel #48 SubChannel #49]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:10.514579866Z I0313 10:38:10.514514 1 healthz.go:278] etcd,poststarthook/authorization.openshift.io-bootstrapclusterroles check failed: livez 2026-03-13T10:38:10.514579866Z [-]etcd failed: error getting data from etcd: context deadline exceeded 2026-03-13T10:38:10.514579866Z [-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: not finished 2026-03-13T10:38:11.745688325Z W0313 10:38:11.745535 1 logging.go:55] [core] [Channel #48 SubChannel #49]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:14.293632838Z W0313 10:38:14.293463 1 logging.go:55] [core] [Channel #48 SubChannel #49]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:19.520656104Z I0313 10:38:19.520520 1 healthz.go:278] etcd,poststarthook/authorization.openshift.io-bootstrapclusterroles check failed: livez 2026-03-13T10:38:19.520656104Z [-]etcd failed: error getting data from etcd: context deadline exceeded 2026-03-13T10:38:19.520656104Z [-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: not finished 2026-03-13T10:38:28.527151857Z I0313 10:38:28.527032 1 healthz.go:278] etcd,poststarthook/authorization.openshift.io-bootstrapclusterroles check failed: livez 2026-03-13T10:38:28.527151857Z [-]etcd failed: error getting data from etcd: context deadline exceeded 2026-03-13T10:38:28.527151857Z [-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: not finished 2026-03-13T10:38:37.535118957Z I0313 10:38:37.534986 1 healthz.go:278] etcd,poststarthook/authorization.openshift.io-bootstrapclusterroles check failed: livez 2026-03-13T10:38:37.535118957Z [-]etcd failed: error getting data from etcd: context deadline exceeded 2026-03-13T10:38:37.535118957Z [-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: not finished 2026-03-13T10:38:41.214454166Z I0313 10:38:41.214387 1 healthz.go:278] poststarthook/authorization.openshift.io-bootstrapclusterroles check failed: livez 2026-03-13T10:38:41.214454166Z [-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: not finished 2026-03-13T10:38:41.218995773Z I0313 10:38:41.218934 1 healthz.go:278] poststarthook/authorization.openshift.io-bootstrapclusterroles check failed: livez 2026-03-13T10:38:41.218995773Z [-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: not finished 2026-03-13T10:38:44.463927043Z I0313 10:38:44.463859 1 healthz.go:278] poststarthook/authorization.openshift.io-bootstrapclusterroles check failed: livez 2026-03-13T10:38:44.463927043Z [-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: not finished 2026-03-13T10:38:48.089898041Z E0313 10:38:48.089818 1 storage_rbac.go:232] "Unhandled Error" err="unable to reconcile clusterrole.rbac.authorization.k8s.io/system:openshift:controller:horizontal-pod-autoscaler: the server was unable to return a response in the time allotted, but may still be processing the request (get clusterroles.rbac.authorization.k8s.io system:openshift:controller:horizontal-pod-autoscaler)" 2026-03-13T10:38:48.966918003Z I0313 10:38:48.966854 1 storage_rbac.go:226] created clusterrole.rbac.authorization.k8s.io/system:openshift:controller:template-service-broker 2026-03-13T10:38:48.972786351Z I0313 10:38:48.972738 1 storage_rbac.go:226] created clusterrole.rbac.authorization.k8s.io/system:openshift:controller:default-rolebindings-controller 2026-03-13T10:38:48.978261127Z I0313 10:38:48.978211 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:masters 2026-03-13T10:38:48.986422635Z I0313 10:38:48.986371 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:node-admins 2026-03-13T10:38:48.993194970Z I0313 10:38:48.993156 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/cluster-admins 2026-03-13T10:38:48.998109189Z I0313 10:38:48.998076 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/cluster-readers 2026-03-13T10:38:49.006290958Z I0313 10:38:49.006238 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/basic-users 2026-03-13T10:38:49.011712622Z I0313 10:38:49.011648 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/self-access-reviewers 2026-03-13T10:38:49.021260752Z I0313 10:38:49.021186 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/self-provisioners 2026-03-13T10:38:49.028454451Z I0313 10:38:49.028387 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:oauth-token-deleters 2026-03-13T10:38:49.034138563Z I0313 10:38:49.034089 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/cluster-status-binding 2026-03-13T10:38:49.040237428Z I0313 10:38:49.040126 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:node-proxiers 2026-03-13T10:38:49.045452407Z I0313 10:38:49.045391 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:sdn-readers 2026-03-13T10:38:49.051007875Z I0313 10:38:49.050973 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:webhooks 2026-03-13T10:38:49.057051579Z I0313 10:38:49.056823 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:discovery 2026-03-13T10:38:49.065382912Z I0313 10:38:49.065319 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:build-strategy-docker-binding 2026-03-13T10:38:49.072214819Z I0313 10:38:49.072078 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:build-strategy-source-binding 2026-03-13T10:38:49.078755068Z I0313 10:38:49.078703 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:build-strategy-jenkinspipeline-binding 2026-03-13T10:38:49.085078829Z I0313 10:38:49.085028 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:node-bootstrapper 2026-03-13T10:38:49.092649909Z I0313 10:38:49.092551 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:scope-impersonation 2026-03-13T10:38:49.100954511Z I0313 10:38:49.100880 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:build-controller 2026-03-13T10:38:49.111357727Z I0313 10:38:49.108979 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:build-config-change-controller 2026-03-13T10:38:49.118432702Z I0313 10:38:49.118360 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:deployer-controller 2026-03-13T10:38:49.124936049Z I0313 10:38:49.124861 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:deploymentconfig-controller 2026-03-13T10:38:49.135309614Z I0313 10:38:49.133184 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:template-instance-controller 2026-03-13T10:38:49.139706398Z I0313 10:38:49.139665 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:template-instance-controller:admin 2026-03-13T10:38:49.145423291Z I0313 10:38:49.145389 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:template-instance-finalizer-controller 2026-03-13T10:38:49.150979740Z I0313 10:38:49.150945 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:template-instance-finalizer-controller:admin 2026-03-13T10:38:49.157447286Z I0313 10:38:49.157410 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:origin-namespace-controller 2026-03-13T10:38:49.164352186Z I0313 10:38:49.163441 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:serviceaccount-controller 2026-03-13T10:38:49.169565424Z I0313 10:38:49.169506 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:serviceaccount-pull-secrets-controller 2026-03-13T10:38:49.175728191Z I0313 10:38:49.175645 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:image-trigger-controller 2026-03-13T10:38:49.181710353Z I0313 10:38:49.181652 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:image-import-controller 2026-03-13T10:38:49.187825898Z I0313 10:38:49.187769 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-quota-reconciliation-controller 2026-03-13T10:38:49.194092179Z I0313 10:38:49.194035 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:unidling-controller 2026-03-13T10:38:49.199279586Z I0313 10:38:49.199211 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:service-ingress-ip-controller 2026-03-13T10:38:49.205004250Z I0313 10:38:49.204956 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:pv-recycler-controller 2026-03-13T10:38:49.210245479Z I0313 10:38:49.210210 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:resourcequota-controller 2026-03-13T10:38:49.216315253Z I0313 10:38:49.216272 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:horizontal-pod-autoscaler 2026-03-13T10:38:49.223181742Z I0313 10:38:49.223133 1 storage_rbac.go:254] updated clusterrolebinding.rbac.authorization.k8s.io/system:controller:horizontal-pod-autoscaler with additional subjects: [{ServiceAccount horizontal-pod-autoscaler openshift-infra}] 2026-03-13T10:38:49.231610388Z I0313 10:38:49.231486 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:template-service-broker 2026-03-13T10:38:49.240146867Z I0313 10:38:49.240090 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:image-puller 2026-03-13T10:38:49.249267444Z I0313 10:38:49.249224 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:image-builder 2026-03-13T10:38:49.255742720Z I0313 10:38:49.255689 1 storage_rbac.go:256] created clusterrolebinding.rbac.authorization.k8s.io/system:openshift:controller:default-rolebindings-controller 2026-03-13T10:38:49.273771997Z I0313 10:38:49.273716 1 storage_rbac.go:289] created role.rbac.authorization.k8s.io/shared-resource-viewer in openshift 2026-03-13T10:38:49.287548786Z I0313 10:38:49.287467 1 storage_rbac.go:289] created role.rbac.authorization.k8s.io/system:node-config-reader in openshift-node 2026-03-13T10:38:49.400183425Z I0313 10:38:49.400119 1 storage_rbac.go:321] created rolebinding.rbac.authorization.k8s.io/shared-resource-viewers in openshift 2026-03-13T10:38:49.463196817Z I0313 10:38:49.463104 1 healthz.go:278] poststarthook/authorization.openshift.io-bootstrapclusterroles check failed: livez 2026-03-13T10:38:49.463196817Z [-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: not finished 2026-03-13T10:38:49.500852521Z I0313 10:38:49.500513 1 storage_rbac.go:321] created rolebinding.rbac.authorization.k8s.io/system:node-config-reader in openshift-node 2026-03-13T10:38:49.748316802Z I0313 10:38:49.748246 1 storage_rbac.go:226] created clusterrole.rbac.authorization.k8s.io/system:openshift:controller:resourcequota-controller 2026-03-13T10:38:49.755649625Z I0313 10:38:49.755572 1 storage_rbac.go:226] created clusterrole.rbac.authorization.k8s.io/system:openshift:controller:horizontal-pod-autoscaler 2026-03-13T10:39:33.477809693Z I0313 10:39:33.477735 1 policy_source.go:224] refreshing policies 2026-03-13T10:40:00.505684856Z I0313 10:40:00.505609 1 policy_source.go:224] refreshing policies 2026-03-13T10:40:01.506800370Z I0313 10:40:01.505978 1 policy_source.go:224] refreshing policies 2026-03-13T10:40:01.524913979Z I0313 10:40:01.524772 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-13T10:40:01.530224230Z I0313 10:40:01.530147 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 openshift-apiserver-operator_current.log0000640000000000000000000001001315154764724040366 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-799b6db4d7-sdg4w2026-03-13T10:38:43.669682833Z I0313 10:38:43.668402 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T10:38:43.669682833Z I0313 10:38:43.668541 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T10:38:43.669959032Z I0313 10:38:43.669919 1 observer_polling.go:159] Starting file observer 2026-03-13T10:38:43.701267422Z I0313 10:38:43.701222 1 builder.go:304] openshift-apiserver-operator version - 2026-03-13T10:38:44.024994719Z I0313 10:38:44.024939 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T10:38:44.024994719Z W0313 10:38:44.024974 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:38:44.024994719Z W0313 10:38:44.024979 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:38:44.024994719Z W0313 10:38:44.024983 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T10:38:44.024994719Z W0313 10:38:44.024988 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T10:38:44.025045491Z W0313 10:38:44.024992 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T10:38:44.025045491Z W0313 10:38:44.024996 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T10:38:44.030617290Z I0313 10:38:44.029868 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T10:38:44.030617290Z I0313 10:38:44.029925 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T10:38:44.030617290Z I0313 10:38:44.029951 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T10:38:44.030617290Z I0313 10:38:44.030024 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T10:38:44.030617290Z I0313 10:38:44.030091 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T10:38:44.030617290Z I0313 10:38:44.030150 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:38:44.030617290Z I0313 10:38:44.030160 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:38:44.030617290Z I0313 10:38:44.030174 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T10:38:44.030617290Z I0313 10:38:44.030179 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:38:44.132637837Z I0313 10:38:44.130857 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:38:44.132637837Z I0313 10:38:44.130924 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T10:38:44.132637837Z I0313 10:38:44.131039 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:38:44.604139509Z I0313 10:38:44.603505 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T10:38:44.609539133Z I0313 10:38:44.607878 1 leaderelection.go:254] attempting to acquire leader lease openshift-apiserver-operator/openshift-apiserver-operator-lock... openshift-apiserver-operator_previous.log0000640000000000000000000004443615154764724040600 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-799b6db4d7-sdg4w2026-03-13T10:36:29.998133179Z W0313 10:36:29.997565 1 dynamic_operator_client.go:355] .status.conditions["APIServerWorkloadDegraded"].message is missing; this will eventually be fatal 2026-03-13T10:36:30.022782404Z I0313 10:36:30.022695 1 status_controller.go:225] clusteroperator/openshift-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-13T10:36:06Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-13T10:36:23Z","message":"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"APIServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-13T10:36:06Z","message":"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\nAPIServicesAvailable: PreconditionNotReady","reason":"APIServerDeployment_NoPod::APIServices_PreconditionNotReady","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-13T10:36:06Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-13T10:36:06Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-13T10:36:30.022979320Z I0313 10:36:30.022911 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T10:36:30.026629408Z I0313 10:36:30.023021 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T10:36:30.039224188Z I0313 10:36:30.036775 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-apiserver-operator", Name:"openshift-apiserver-operator", UID:"e5df3610-033f-48d6-a220-e3dca41e838e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/openshift-apiserver changed: Progressing message changed from "APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2." to "APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available" 2026-03-13T10:36:31.906883891Z I0313 10:36:31.906374 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T10:36:35.554396507Z I0313 10:36:35.553731 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T10:36:35.603128453Z I0313 10:36:35.602847 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T10:36:35.620986855Z I0313 10:36:35.620903 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T10:36:35.641290503Z I0313 10:36:35.640338 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T10:36:35.708566409Z I0313 10:36:35.708496 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T10:36:38.311572590Z I0313 10:36:38.311505 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T10:36:39.685221418Z I0313 10:36:39.685158 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T10:36:40.619674371Z I0313 10:36:40.616005 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T10:36:42.830792785Z I0313 10:36:42.830697 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T10:36:47.886569923Z I0313 10:36:47.886497 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T10:37:39.899928482Z E0313 10:37:39.899842 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-13T10:37:54.752371050Z I0313 10:37:54.752299 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="3f65b1d95db6375f3200d705e0f383ec35b749d01ce831fae321695517a2039d") 2026-03-13T10:37:54.752499323Z W0313 10:37:54.752481 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-13T10:37:54.752664698Z I0313 10:37:54.752645 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="f24fa5456167839327a9e0ae8fc5ad1965b4578221f0f05ebca91e057d8bcbe2") 2026-03-13T10:37:54.754380451Z I0313 10:37:54.752710 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-13T10:37:54.754380451Z I0313 10:37:54.752753 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-13T10:37:54.754380451Z I0313 10:37:54.752906 1 base_controller.go:181] Shutting down openshift-apiserver ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.752925 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.752947 1 base_controller.go:181] Shutting down OpenShiftAPIServer-WorkloadWorkloadController ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.752989 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionMigration ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.752989 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionCondition ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.752999 1 base_controller.go:123] Shutting down worker of openshift-apiserver controller ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753473 1 base_controller.go:113] All openshift-apiserver workers have been terminated 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753476 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-3732348295/tls.crt::/tmp/serving-cert-3732348295/tls.key" 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753642 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753653 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753679 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753698 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753723 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753024 1 base_controller.go:181] Shutting down ConnectivityCheckController ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753045 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionMigration controller ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753743 1 base_controller.go:113] All openshift-apiserver-EncryptionMigration workers have been terminated 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753023 1 base_controller.go:123] Shutting down worker of OpenShiftAPIServer-WorkloadWorkloadController controller ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753751 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753757 1 base_controller.go:113] All OpenShiftAPIServer-WorkloadWorkloadController workers have been terminated 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753760 1 builder.go:335] server exited 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753023 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753775 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753066 1 base_controller.go:181] Shutting down NamespaceFinalizerController_openshift-apiserver ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753072 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionState ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753066 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753792 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753075 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753086 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionKey ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753084 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionCondition controller ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753809 1 base_controller.go:113] All openshift-apiserver-EncryptionCondition workers have been terminated 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753097 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753098 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionPrune controller ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753110 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753108 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionKey controller ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753829 1 base_controller.go:113] All openshift-apiserver-EncryptionKey workers have been terminated 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753108 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionState controller ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753837 1 base_controller.go:113] All openshift-apiserver-EncryptionState workers have been terminated 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753122 1 base_controller.go:181] Shutting down APIServerStaticResources-StaticResources ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753156 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753168 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753845 1 base_controller.go:181] Shutting down SecretRevisionPruneController ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753856 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753850 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753864 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753191 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753881 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753198 1 base_controller.go:181] Shutting down openshift-apiserver-RemoveStaleConditions ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753198 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753207 1 base_controller.go:123] Shutting down worker of StatusSyncer_openshift-apiserver controller ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753207 1 base_controller.go:123] Shutting down worker of openshift-apiserver-RemoveStaleConditions controller ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753921 1 base_controller.go:113] All openshift-apiserver-RemoveStaleConditions workers have been terminated 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753220 1 base_controller.go:181] Shutting down openshift-apiserver-UnsupportedConfigOverrides ... 2026-03-13T10:37:54.754380451Z E0313 10:37:54.753223 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-apiserver reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-apiserver\": context canceled" 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753229 1 base_controller.go:123] Shutting down worker of openshift-apiserver-UnsupportedConfigOverrides controller ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753961 1 base_controller.go:113] All openshift-apiserver-UnsupportedConfigOverrides workers have been terminated 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753416 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753437 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753450 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753052 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionPrune ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.754037 1 base_controller.go:113] All openshift-apiserver-EncryptionPrune workers have been terminated 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753175 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.754051 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-13T10:37:54.754380451Z I0313 10:37:54.753185 1 base_controller.go:181] Shutting down StatusSyncer_openshift-apiserver ... 2026-03-13T10:37:54.754380451Z I0313 10:37:54.754066 1 base_controller.go:159] All StatusSyncer_openshift-apiserver post start hooks have been terminated 2026-03-13T10:37:54.754380451Z I0313 10:37:54.754072 1 base_controller.go:113] All StatusSyncer_openshift-apiserver workers have been terminated 2026-03-13T10:37:54.754661119Z E0313 10:37:54.754629 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-13T10:37:54.754661119Z E0313 10:37:54.754649 1 leaderelection.go:436] error retrieving resource lock openshift-apiserver-operator/openshift-apiserver-operator-lock: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock?timeout=4m0s": context canceled 2026-03-13T10:37:54.754693830Z I0313 10:37:54.754668 1 leaderelection.go:297] failed to renew lease openshift-apiserver-operator/openshift-apiserver-operator-lock: timed out waiting for the condition 2026-03-13T10:37:54.756258157Z I0313 10:37:54.754971 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-apiserver controller ... 2026-03-13T10:37:54.756258157Z I0313 10:37:54.754983 1 base_controller.go:113] All NamespaceFinalizerController_openshift-apiserver workers have been terminated 2026-03-13T10:37:54.756258157Z E0313 10:37:54.755150 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"v3.11.0/openshift-apiserver/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-apiserver\": context canceled, \"v3.11.0/openshift-apiserver/apiserver-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/pdb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T10:37:54.756258157Z I0313 10:37:54.755900 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-13T10:37:54.756258157Z I0313 10:37:54.755948 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-13T10:37:54.756487524Z I0313 10:37:54.756381 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-03-13T10:37:54.756487524Z I0313 10:37:54.756403 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-03-13T10:37:59.752206852Z I0313 10:37:59.752102 1 observer_polling.go:162] Shutting down file observer 2026-03-13T10:38:28.759342986Z E0313 10:38:28.759162 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T10:38:28.759342986Z W0313 10:38:28.759238 1 leaderelection.go:84] leader election lost config/pod/openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-sdg4w.json0000640000000000000000000001443115154764724030311 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-799b6db4d7-sdg4w","generateName":"openshift-apiserver-operator-799b6db4d7-","namespace":"openshift-apiserver-operator","uid":"5ed5e77b-948b-4d94-ac9f-440ee3c07e18","resourceVersion":"7400","creationTimestamp":"2026-03-13T10:33:23Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"799b6db4d7"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.5/23\"],\"mac_address\":\"0a:58:0a:80:00:05\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.5/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.5\"\n ],\n \"mac\": \"0a:58:0a:80:00:05\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-799b6db4d7","uid":"6db3b4d9-c024-4ab7-9ec4-b848c965efff","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-22bwx","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-22bwx","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c15,c0"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:46Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.5","podIPs":[{"ip":"10.128.0.5"}],"startTime":"2026-03-13T10:35:36Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-03-13T10:38:43Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T10:36:04Z","finishedAt":"2026-03-13T10:38:28Z","containerID":"cri-o://dacb5471d19718622299f0fa6f9e909a820c9329353d0e6ad130c4eb61cefa28"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","containerID":"cri-o://7f952b61d71e907b8ab35c403ca342055b58e2b44f1c8092061e8d04df9ac501","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-22bwx","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}cluster-olm-operator_current.log0000640000000000000000000001014015154764724035121 0ustar0000000000000000config/pod/openshift-cluster-olm-operator/logs/cluster-olm-operator-77899cf6d-kh9h22026-03-13T10:38:43.719393722Z I0313 10:38:43.719207 1 cmd.go:250] Using service-serving-cert provided certificates 2026-03-13T10:38:43.719393722Z I0313 10:38:43.719356 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T10:38:43.720138475Z I0313 10:38:43.720086 1 observer_polling.go:159] Starting file observer 2026-03-13T10:38:43.756045915Z I0313 10:38:43.753075 1 builder.go:298] cluster-olm-operator version 4.18.0-202602132343.p2.g88088e4.assembly.stream.el9-88088e4-88088e4bfe9f55ea7ab2c4331cebee727c8c0c34 2026-03-13T10:38:44.250637429Z I0313 10:38:44.250360 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T10:38:44.250637429Z W0313 10:38:44.250509 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:38:44.250637429Z W0313 10:38:44.250517 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:38:44.250637429Z W0313 10:38:44.250525 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T10:38:44.250637429Z W0313 10:38:44.250529 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T10:38:44.250637429Z W0313 10:38:44.250533 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T10:38:44.250637429Z W0313 10:38:44.250537 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T10:38:44.255142155Z I0313 10:38:44.255107 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T10:38:44.255158686Z I0313 10:38:44.255141 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T10:38:44.255205377Z I0313 10:38:44.255181 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:38:44.255205377Z I0313 10:38:44.255198 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:38:44.255233438Z I0313 10:38:44.255214 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T10:38:44.255233438Z I0313 10:38:44.255224 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:38:44.255536637Z I0313 10:38:44.255516 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T10:38:44.255600059Z I0313 10:38:44.255567 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T10:38:44.255717413Z I0313 10:38:44.255697 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T10:38:44.356654987Z I0313 10:38:44.356082 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:38:44.356654987Z I0313 10:38:44.356160 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T10:38:44.356654987Z I0313 10:38:44.356281 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:38:44.603837640Z I0313 10:38:44.603214 1 builder.go:439] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T10:38:44.604000455Z I0313 10:38:44.603981 1 leaderelection.go:254] attempting to acquire leader lease openshift-cluster-olm-operator/cluster-olm-operator-lock... cluster-olm-operator_previous.log0000640000000000000000000005403415154764724035325 0ustar0000000000000000config/pod/openshift-cluster-olm-operator/logs/cluster-olm-operator-77899cf6d-kh9h22026-03-13T10:36:47.920716034Z I0313 10:36:47.919865 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-03-13T10:36:47.920716034Z I0313 10:36:47.920070 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-03-13T10:36:47.921840015Z I0313 10:36:47.920832 1 incompatible_operator_controller.go:65] "sync started" logger="OLMIncompatibleOperatorController" 2026-03-13T10:36:47.921840015Z I0313 10:36:47.920964 1 incompatible_operator_controller.go:101] "sync finished" logger="OLMIncompatibleOperatorController" 2026-03-13T10:36:47.921840015Z I0313 10:36:47.921536 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftCertifiedOperators" 2026-03-13T10:36:47.921840015Z I0313 10:36:47.921661 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftCertifiedOperators" 2026-03-13T10:36:47.924206418Z I0313 10:36:47.922316 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftCommunityOperators" 2026-03-13T10:36:47.924206418Z I0313 10:36:47.922463 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftCommunityOperators" 2026-03-13T10:36:47.924206418Z I0313 10:36:47.923565 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-03-13T10:36:47.924206418Z I0313 10:36:47.923941 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-03-13T10:36:47.926721696Z I0313 10:36:47.925974 1 status_controller.go:225] clusteroperator/olm diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-13T10:36:13Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-13T10:36:24Z","message":"OperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to deploy pods","reason":"OperatorcontrollerDeploymentOperatorControllerControllerManager_Deploying","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-13T10:36:24Z","message":"OperatorcontrollerDeploymentOperatorControllerControllerManagerAvailable: Waiting for Deployment","reason":"OperatorcontrollerDeploymentOperatorControllerControllerManager_Deploying","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-13T10:36:13Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-13T10:36:13Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-13T10:36:47.950659303Z I0313 10:36:47.948651 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-cluster-olm-operator", Name:"cluster-olm-operator", UID:"b2241b58-70d1-4378-8c0f-92b8468b1f2d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/olm changed: Progressing message changed from "CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to deploy pods" to "OperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to deploy pods",Available message changed from "CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment\nOperatorcontrollerDeploymentOperatorControllerControllerManagerAvailable: Waiting for Deployment" to "OperatorcontrollerDeploymentOperatorControllerControllerManagerAvailable: Waiting for Deployment" 2026-03-13T10:36:47.950659303Z I0313 10:36:47.949516 1 builder.go:222] "Updating environment" logger="builder" deployment="operator-controller-controller-manager" 2026-03-13T10:36:48.005718979Z I0313 10:36:48.005035 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-03-13T10:36:48.005718979Z I0313 10:36:48.005256 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-03-13T10:36:48.005761940Z I0313 10:36:48.005725 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftCommunityOperators" 2026-03-13T10:36:48.005819311Z I0313 10:36:48.005781 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-03-13T10:36:48.006217452Z I0313 10:36:48.005991 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftCommunityOperators" 2026-03-13T10:36:48.006217452Z I0313 10:36:48.005995 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-03-13T10:36:48.007400284Z I0313 10:36:48.006629 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftCertifiedOperators" 2026-03-13T10:36:48.007400284Z I0313 10:36:48.006860 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftCertifiedOperators" 2026-03-13T10:36:48.014171457Z I0313 10:36:48.014124 1 builder.go:222] "Updating environment" logger="builder" deployment="catalogd-controller-manager" 2026-03-13T10:36:48.049194762Z I0313 10:36:48.048160 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-03-13T10:36:48.049194762Z I0313 10:36:48.048386 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-03-13T10:36:48.049842590Z I0313 10:36:48.049426 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftCommunityOperators" 2026-03-13T10:36:48.051624868Z I0313 10:36:48.051023 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftCertifiedOperators" 2026-03-13T10:36:48.051624868Z I0313 10:36:48.051359 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftCertifiedOperators" 2026-03-13T10:36:48.053140229Z I0313 10:36:48.052553 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-03-13T10:36:48.055636206Z I0313 10:36:48.054861 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-03-13T10:36:48.060926149Z I0313 10:36:48.059245 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftCommunityOperators" 2026-03-13T10:36:48.061115264Z I0313 10:36:48.061080 1 builder.go:222] "Updating environment" logger="builder" deployment="operator-controller-controller-manager" 2026-03-13T10:36:48.098076252Z I0313 10:36:48.097765 1 builder.go:222] "Updating environment" logger="builder" deployment="catalogd-controller-manager" 2026-03-13T10:37:17.785233088Z I0313 10:37:17.785123 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="ec3e54f5bc928543fd9da39354959dedad31530df4a552ba0abe287fd36dbcde") 2026-03-13T10:37:17.785233088Z W0313 10:37:17.785183 1 builder.go:154] Restart triggered because of file /var/run/secrets/serving-cert/tls.key was created 2026-03-13T10:37:17.785329981Z I0313 10:37:17.785268 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="3dd2b7ceb4e336179211df946bb1c5c8b1ffc6450da984aff809504385779c3d") 2026-03-13T10:37:17.785530277Z I0313 10:37:17.785461 1 base_controller.go:181] Shutting down CatalogdClusterCatalogOpenshiftCommunityOperators ... 2026-03-13T10:37:17.785530277Z I0313 10:37:17.785521 1 base_controller.go:181] Shutting down CatalogdClusterCatalogOpenshiftRedhatMarketplace ... 2026-03-13T10:37:17.785549658Z I0313 10:37:17.785513 1 base_controller.go:181] Shutting down OLMIncompatibleOperatorController ... 2026-03-13T10:37:17.785566709Z I0313 10:37:17.785540 1 base_controller.go:181] Shutting down OperatorControllerStaticResources-StaticResources ... 2026-03-13T10:37:17.785583389Z I0313 10:37:17.785566 1 base_controller.go:181] Shutting down CatalogdDeploymentCatalogdControllerManager ... 2026-03-13T10:37:17.785759944Z I0313 10:37:17.785705 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-13T10:37:17.785759944Z I0313 10:37:17.785750 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-13T10:37:17.786291301Z I0313 10:37:17.785900 1 base_controller.go:181] Shutting down OLMStaticUpgradeableConditionController ... 2026-03-13T10:37:17.786291301Z I0313 10:37:17.785930 1 base_controller.go:181] Shutting down StatusSyncer_olm ... 2026-03-13T10:37:17.786291301Z I0313 10:37:17.785938 1 base_controller.go:159] All StatusSyncer_olm post start hooks have been terminated 2026-03-13T10:37:17.786291301Z I0313 10:37:17.785963 1 base_controller.go:181] Shutting down CatalogdStaticResources-StaticResources ... 2026-03-13T10:37:17.786291301Z I0313 10:37:17.786184 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-13T10:37:17.786291301Z I0313 10:37:17.786219 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-13T10:37:17.786388014Z I0313 10:37:17.786294 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-13T10:37:17.786388014Z I0313 10:37:17.786314 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T10:37:17.786388014Z I0313 10:37:17.786328 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T10:37:17.786570359Z I0313 10:37:17.786533 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:37:17.786570359Z I0313 10:37:17.786562 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-13T10:37:17.786640461Z I0313 10:37:17.786580 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T10:37:17.787087125Z E0313 10:37:17.786722 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-cluster-olm-operator/leases/cluster-olm-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-03-13T10:37:17.787087125Z E0313 10:37:17.786803 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-olm-operator/cluster-olm-operator-lock: client rate limiter Wait returned an error: context canceled 2026-03-13T10:37:17.787087125Z I0313 10:37:17.786818 1 leaderelection.go:297] failed to renew lease openshift-cluster-olm-operator/cluster-olm-operator-lock: timed out waiting for the condition 2026-03-13T10:37:17.787087125Z I0313 10:37:17.786886 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-2420006455/tls.crt::/tmp/serving-cert-2420006455/tls.key" 2026-03-13T10:37:17.787087125Z I0313 10:37:17.786971 1 base_controller.go:181] Shutting down CatalogdClusterCatalogOpenshiftCertifiedOperators ... 2026-03-13T10:37:17.787087125Z I0313 10:37:17.786990 1 base_controller.go:181] Shutting down OperatorcontrollerDeploymentOperatorControllerControllerManager ... 2026-03-13T10:37:17.787087125Z I0313 10:37:17.787003 1 base_controller.go:181] Shutting down CatalogdClusterCatalogOpenshiftRedhatOperators ... 2026-03-13T10:37:17.787087125Z I0313 10:37:17.787018 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-13T10:37:17.787087125Z I0313 10:37:17.787022 1 base_controller.go:123] Shutting down worker of CatalogdClusterCatalogOpenshiftCertifiedOperators controller ... 2026-03-13T10:37:17.787087125Z I0313 10:37:17.787028 1 builder.go:329] server exited 2026-03-13T10:37:17.787087125Z I0313 10:37:17.787030 1 base_controller.go:113] All CatalogdClusterCatalogOpenshiftCertifiedOperators workers have been terminated 2026-03-13T10:37:17.787087125Z I0313 10:37:17.787037 1 base_controller.go:123] Shutting down worker of CatalogdClusterCatalogOpenshiftRedhatOperators controller ... 2026-03-13T10:37:17.787087125Z I0313 10:37:17.787044 1 base_controller.go:113] All CatalogdClusterCatalogOpenshiftRedhatOperators workers have been terminated 2026-03-13T10:37:17.787087125Z I0313 10:37:17.787067 1 base_controller.go:123] Shutting down worker of StatusSyncer_olm controller ... 2026-03-13T10:37:17.787087125Z I0313 10:37:17.787075 1 base_controller.go:113] All StatusSyncer_olm workers have been terminated 2026-03-13T10:37:17.787087125Z I0313 10:37:17.787081 1 base_controller.go:181] Shutting down OLMProxyController ... 2026-03-13T10:37:17.787144837Z I0313 10:37:17.787084 1 base_controller.go:123] Shutting down worker of OLMStaticUpgradeableConditionController controller ... 2026-03-13T10:37:17.787144837Z I0313 10:37:17.787091 1 base_controller.go:113] All OLMStaticUpgradeableConditionController workers have been terminated 2026-03-13T10:37:17.787144837Z I0313 10:37:17.787095 1 base_controller.go:123] Shutting down worker of OLMProxyController controller ... 2026-03-13T10:37:17.787144837Z I0313 10:37:17.787104 1 base_controller.go:113] All OLMProxyController workers have been terminated 2026-03-13T10:37:17.787144837Z I0313 10:37:17.787105 1 base_controller.go:123] Shutting down worker of CatalogdClusterCatalogOpenshiftCommunityOperators controller ... 2026-03-13T10:37:17.787144837Z I0313 10:37:17.787112 1 base_controller.go:123] Shutting down worker of CatalogdClusterCatalogOpenshiftRedhatMarketplace controller ... 2026-03-13T10:37:17.787144837Z I0313 10:37:17.787118 1 base_controller.go:113] All CatalogdClusterCatalogOpenshiftCommunityOperators workers have been terminated 2026-03-13T10:37:17.787144837Z I0313 10:37:17.787120 1 base_controller.go:113] All CatalogdClusterCatalogOpenshiftRedhatMarketplace workers have been terminated 2026-03-13T10:37:17.787179828Z I0313 10:37:17.787150 1 base_controller.go:123] Shutting down worker of OLMIncompatibleOperatorController controller ... 2026-03-13T10:37:17.787200898Z I0313 10:37:17.787187 1 base_controller.go:113] All OLMIncompatibleOperatorController workers have been terminated 2026-03-13T10:37:17.787226069Z I0313 10:37:17.787212 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-13T10:37:17.787247060Z I0313 10:37:17.787234 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-13T10:37:17.787267830Z I0313 10:37:17.787245 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-13T10:37:17.788057154Z W0313 10:37:17.787887 1 base_controller.go:242] Updating status of "CatalogdDeploymentCatalogdControllerManager" failed: unable to ApplyStatus for operator using fieldManager "CatalogdDeploymentCatalogdControllerManager-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-13T10:37:17.788057154Z E0313 10:37:17.787972 1 base_controller.go:279] "Unhandled Error" err="CatalogdDeploymentCatalogdControllerManager reconciliation failed: Get \"https://172.30.0.1:443/apis/apps/v1/namespaces/openshift-catalogd/deployments/catalogd-controller-manager\": context canceled" 2026-03-13T10:37:17.789677323Z E0313 10:37:17.789073 1 base_controller.go:279] "Unhandled Error" err="OperatorControllerStaticResources-StaticResources reconciliation failed: [\"operator-controller/09-clusterrole-operator-controller-extension-viewer-role.yml\" (string): Get \"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/clusterroles/operator-controller-extension-viewer-role\": context canceled, \"operator-controller/10-clusterrole-operator-controller-manager-role.yml\" (string): client rate limiter Wait returned an error: context canceled, \"operator-controller/11-clusterrole-operator-controller-metrics-reader.yml\" (string): client rate limiter Wait returned an error: context canceled, \"operator-controller/12-clusterrole-operator-controller-proxy-role.yml\" (string): client rate limiter Wait returned an error: context canceled, \"operator-controller/13-rolebinding-openshift-config-operator-controller-manager-rolebinding.yml\" (string): client rate limiter Wait returned an error: context canceled, \"operator-controller/14-rolebinding-openshift-operator-controller-operator-controller-leader-election-rolebinding.yml\" (string): client rate limiter Wait returned an error: context canceled, \"operator-controller/15-rolebinding-openshift-operator-controller-operator-controller-manager-rolebinding.yml\" (string): client rate limiter Wait returned an error: context canceled, \"operator-controller/16-clusterrolebinding-operator-controller-manager-rolebinding.yml\" (string): client rate limiter Wait returned an error: context canceled, \"operator-controller/17-clusterrolebinding-operator-controller-proxy-rolebinding.yml\" (string): client rate limiter Wait returned an error: context canceled, \"operator-controller/18-configmap-openshift-operator-controller-operator-controller-trusted-ca-bundle.yml\" (string): client rate limiter Wait returned an error: context canceled, \"operator-controller/19-service-openshift-operator-controller-operator-controller-controller-manager-metrics-service.yml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"OperatorControllerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T10:37:17.789677323Z I0313 10:37:17.789140 1 base_controller.go:123] Shutting down worker of CatalogdDeploymentCatalogdControllerManager controller ... 2026-03-13T10:37:17.789677323Z I0313 10:37:17.789152 1 base_controller.go:113] All CatalogdDeploymentCatalogdControllerManager workers have been terminated 2026-03-13T10:37:17.789677323Z E0313 10:37:17.789520 1 base_controller.go:279] "Unhandled Error" err="CatalogdStaticResources-StaticResources reconciliation failed: [\"catalogd/07-clusterrole-catalogd-proxy-role.yml\" (string): Get \"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/clusterroles/catalogd-proxy-role\": context canceled, \"catalogd/08-rolebinding-openshift-catalogd-catalogd-leader-election-rolebinding.yml\" (string): client rate limiter Wait returned an error: context canceled, \"catalogd/09-rolebinding-openshift-config-catalogd-manager-rolebinding.yml\" (string): client rate limiter Wait returned an error: context canceled, \"catalogd/10-clusterrolebinding-catalogd-manager-rolebinding.yml\" (string): client rate limiter Wait returned an error: context canceled, \"catalogd/11-clusterrolebinding-catalogd-proxy-rolebinding.yml\" (string): client rate limiter Wait returned an error: context canceled, \"catalogd/12-configmap-openshift-catalogd-catalogd-trusted-ca-bundle.yml\" (string): client rate limiter Wait returned an error: context canceled, \"catalogd/13-service-openshift-catalogd-catalogd-service.yml\" (string): client rate limiter Wait returned an error: context canceled, \"catalogd/19-mutatingwebhookconfiguration-catalogd-mutating-webhook-configuration.yml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"CatalogdStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T10:37:17.790686164Z I0313 10:37:17.790663 1 base_controller.go:123] Shutting down worker of OperatorControllerStaticResources-StaticResources controller ... 2026-03-13T10:37:17.790746786Z I0313 10:37:17.790732 1 base_controller.go:113] All OperatorControllerStaticResources-StaticResources workers have been terminated 2026-03-13T10:37:17.790777107Z I0313 10:37:17.790643 1 base_controller.go:123] Shutting down worker of CatalogdStaticResources-StaticResources controller ... 2026-03-13T10:37:17.790817268Z I0313 10:37:17.790805 1 base_controller.go:113] All CatalogdStaticResources-StaticResources workers have been terminated 2026-03-13T10:37:22.785988918Z I0313 10:37:22.785913 1 observer_polling.go:162] Shutting down file observer 2026-03-13T10:37:48.147662821Z W0313 10:37:48.147542 1 base_controller.go:242] Updating status of "OperatorcontrollerDeploymentOperatorControllerControllerManager" failed: unable to ApplyStatus for operator using fieldManager "OperatorcontrollerDeploymentOperatorControllerControllerManager-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-13T10:37:48.147662821Z E0313 10:37:48.147601 1 base_controller.go:279] "Unhandled Error" err="OperatorcontrollerDeploymentOperatorControllerControllerManager reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get olms.operator.openshift.io cluster)" 2026-03-13T10:37:48.148814436Z I0313 10:37:48.148772 1 base_controller.go:123] Shutting down worker of OperatorcontrollerDeploymentOperatorControllerControllerManager controller ... 2026-03-13T10:37:48.148814436Z I0313 10:37:48.148793 1 base_controller.go:113] All OperatorcontrollerDeploymentOperatorControllerControllerManager workers have been terminated 2026-03-13T10:37:51.789875951Z E0313 10:37:51.789821 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T10:37:51.789875951Z W0313 10:37:51.789861 1 leaderelection.go:84] leader election lost config/pod/openshift-cluster-olm-operator/cluster-olm-operator-77899cf6d-kh9h2.json0000640000000000000000000002241715154764724026575 0ustar0000000000000000{"metadata":{"name":"cluster-olm-operator-77899cf6d-kh9h2","generateName":"cluster-olm-operator-77899cf6d-","namespace":"openshift-cluster-olm-operator","uid":"b8d40b37-0f3d-4531-9fa8-eda965d2337d","resourceVersion":"7394","creationTimestamp":"2026-03-13T10:33:23Z","labels":{"name":"cluster-olm-operator","pod-template-hash":"77899cf6d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.9/23\"],\"mac_address\":\"0a:58:0a:80:00:09\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.9/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.9\"\n ],\n \"mac\": \"0a:58:0a:80:00:09\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-olm-operator-77899cf6d","uid":"ab8cb443-8dc0-4abe-80b6-88df9f45024f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cluster-olm-operator-serving-cert","secret":{"secretName":"cluster-olm-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"operand-assets","emptyDir":{}},{"name":"kube-api-access-l5rht","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"copy-catalogd-manifests","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","command":["/bin/sh"],"args":["-c","cp -a /openshift/manifests /operand-assets/catalogd"],"resources":{},"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-l5rht","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000360000,"allowPrivilegeEscalation":false}},{"name":"copy-operator-controller-manifests","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","command":["/bin/sh"],"args":["-c","cp -a /openshift/manifests /operand-assets/operator-controller"],"resources":{},"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-l5rht","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000360000,"allowPrivilegeEscalation":false}}],"containers":[{"name":"cluster-olm-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","command":["/cluster-olm-operator"],"args":["start"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"OPERATOR_NAME","value":"cluster-olm-operator"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501"},{"name":"CATALOGD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783"},{"name":"OPERATOR_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"cluster-olm-operator-serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-l5rht","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000360000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-olm-operator","serviceAccount":"cluster-olm-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c19,c9"},"runAsNonRoot":true,"fsGroup":1000360000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:46Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:08Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.9","podIPs":[{"ip":"10.128.0.9"}],"startTime":"2026-03-13T10:35:36Z","initContainerStatuses":[{"name":"copy-catalogd-manifests","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T10:36:03Z","finishedAt":"2026-03-13T10:36:03Z","containerID":"cri-o://11c77f1b96585ddf0a5deeffc87c0df0c85a30ab4a6f38b300cbba0aba3b3555"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","containerID":"cri-o://11c77f1b96585ddf0a5deeffc87c0df0c85a30ab4a6f38b300cbba0aba3b3555","started":false,"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-l5rht","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"copy-operator-controller-manifests","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T10:36:08Z","finishedAt":"2026-03-13T10:36:08Z","containerID":"cri-o://220a150d44b2158d9daff116df4a5c802964a9b842e1b8dda3de819c2cb69708"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","containerID":"cri-o://220a150d44b2158d9daff116df4a5c802964a9b842e1b8dda3de819c2cb69708","started":false,"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-l5rht","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"cluster-olm-operator","state":{"running":{"startedAt":"2026-03-13T10:38:43Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T10:36:12Z","finishedAt":"2026-03-13T10:37:51Z","containerID":"cri-o://a242486632cda89db044ed9feff7bb156e404c15924daa0514297e6cfa246629"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","containerID":"cri-o://928f705a6df1a237b298e2f772354a8814379ea930e2d466bbe222c0fc185584","started":true,"volumeMounts":[{"name":"cluster-olm-operator-serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-l5rht","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-rbac-proxy_current.log0000640000000000000000000001620515154764724037710 0ustar0000000000000000config/pod/openshift-operator-controller/logs/operator-controller-controller-manager-6598bfb6c4-bg6zf2026-03-13T10:36:32.953554783Z I0313 10:36:32.953326 1 flags.go:64] FLAG: --add-dir-header="false" 2026-03-13T10:36:32.953554783Z I0313 10:36:32.953481 1 flags.go:64] FLAG: --allow-paths="[]" 2026-03-13T10:36:32.953554783Z I0313 10:36:32.953491 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-03-13T10:36:32.953554783Z I0313 10:36:32.953495 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-03-13T10:36:32.953554783Z I0313 10:36:32.953499 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-03-13T10:36:32.953554783Z I0313 10:36:32.953513 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-03-13T10:36:32.953554783Z I0313 10:36:32.953517 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-03-13T10:36:32.953554783Z I0313 10:36:32.953521 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-03-13T10:36:32.953554783Z I0313 10:36:32.953526 1 flags.go:64] FLAG: --client-ca-file="" 2026-03-13T10:36:32.953554783Z I0313 10:36:32.953530 1 flags.go:64] FLAG: --config-file="" 2026-03-13T10:36:32.953554783Z I0313 10:36:32.953533 1 flags.go:64] FLAG: --help="false" 2026-03-13T10:36:32.953554783Z I0313 10:36:32.953536 1 flags.go:64] FLAG: --http2-disable="true" 2026-03-13T10:36:32.953554783Z I0313 10:36:32.953540 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-03-13T10:36:32.953554783Z I0313 10:36:32.953545 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953548 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953554 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953557 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953562 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953567 1 flags.go:64] FLAG: --kubeconfig="" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953570 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953574 1 flags.go:64] FLAG: --log-dir="" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953577 1 flags.go:64] FLAG: --log-file="" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953598 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953604 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953608 1 flags.go:64] FLAG: --logtostderr="true" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953612 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953615 1 flags.go:64] FLAG: --oidc-clientID="" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953619 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953622 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953627 1 flags.go:64] FLAG: --oidc-issuer="" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953630 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953643 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953646 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953650 1 flags.go:64] FLAG: --one-output="false" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953653 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953657 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:8443" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953660 1 flags.go:64] FLAG: --skip-headers="false" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953664 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953668 1 flags.go:64] FLAG: --stderrthreshold="" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953671 1 flags.go:64] FLAG: --tls-cert-file="" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953674 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953678 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953682 1 flags.go:64] FLAG: --tls-private-key-file="" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953685 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953690 1 flags.go:64] FLAG: --upstream="http://127.0.0.1:8080/" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953694 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953698 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953702 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953705 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953709 1 flags.go:64] FLAG: --v="2" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953713 1 flags.go:64] FLAG: --version="false" 2026-03-13T10:36:32.953748028Z I0313 10:36:32.953718 1 flags.go:64] FLAG: --vmodule="" 2026-03-13T10:36:32.953748028Z W0313 10:36:32.953730 1 options.go:150] 2026-03-13T10:36:32.953748028Z ==== Deprecation Warning ====================== 2026-03-13T10:36:32.953748028Z 2026-03-13T10:36:32.953748028Z Insecure listen address will be removed. 2026-03-13T10:36:32.953748028Z Using --insecure-listen-address won't be possible! 2026-03-13T10:36:32.953748028Z 2026-03-13T10:36:32.953748028Z The ability to run kube-rbac-proxy without TLS certificates will be removed. 2026-03-13T10:36:32.953748028Z Not using --tls-cert-file and --tls-private-key-file won't be possible! 2026-03-13T10:36:32.953748028Z 2026-03-13T10:36:32.953748028Z For more information, please go to https://github.com/brancz/kube-rbac-proxy/issues/187 2026-03-13T10:36:32.953748028Z 2026-03-13T10:36:32.953748028Z =============================================== 2026-03-13T10:36:32.953748028Z 2026-03-13T10:36:32.953748028Z 2026-03-13T10:36:32.953748028Z W0313 10:36:32.953740 1 deprecated.go:66] 2026-03-13T10:36:32.953748028Z ==== Removed Flag Warning ====================== 2026-03-13T10:36:32.953748028Z 2026-03-13T10:36:32.953748028Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-13T10:36:32.953748028Z 2026-03-13T10:36:32.953748028Z =============================================== 2026-03-13T10:36:32.953748028Z 2026-03-13T10:36:32.954413186Z I0313 10:36:32.954371 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-13T10:36:32.956147263Z I0313 10:36:32.956120 1 kube-rbac-proxy.go:331] Generating self signed cert as no cert is provided 2026-03-13T10:36:33.649278323Z I0313 10:36:33.648435 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-13T10:36:33.650032203Z I0313 10:36:33.650001 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 manager_current.log0000640000000000000000000006004415154764724036310 0ustar0000000000000000config/pod/openshift-operator-controller/logs/operator-controller-controller-manager-6598bfb6c4-bg6zf2026-03-13T10:38:50.525695590Z I0313 10:38:50.523686 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Entrust Root Certification Authority - EC1,OU=See www.entrust.net/legal-terms+OU=(c) 2012 Entrust\\, Inc. - for authorized use only,O=Entrust\\, Inc.,C=US" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.523713 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Entrust Root Certification Authority - G2,OU=See www.entrust.net/legal-terms+OU=(c) 2009 Entrust\\, Inc. - for authorized use only,O=Entrust\\, Inc.,C=US" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.523736 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=FIRMAPROFESIONAL CA ROOT-A WEB,O=Firmaprofesional SA,C=ES,2.5.4.97=#130f56415445532d413632363334303638" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.523758 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GDCA TrustAUTH R5 ROOT,O=GUANG DONG CERTIFICATE AUTHORITY CO.\\,LTD.,C=CN" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.523780 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GLOBALTRUST 2020,O=e-commerce monitoring GmbH,C=AT" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.523804 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GTS Root R1,O=Google Trust Services LLC,C=US" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.523829 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GTS Root R2,O=Google Trust Services LLC,C=US" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.523852 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GTS Root R3,O=Google Trust Services LLC,C=US" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.523872 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GTS Root R4,O=Google Trust Services LLC,C=US" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.523893 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GlobalSign,OU=GlobalSign ECC Root CA - R4,O=GlobalSign" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.523913 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GlobalSign,OU=GlobalSign ECC Root CA - R5,O=GlobalSign" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.523932 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GlobalSign,OU=GlobalSign Root CA - R3,O=GlobalSign" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.523955 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GlobalSign,OU=GlobalSign Root CA - R6,O=GlobalSign" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.523973 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GlobalSign Root E46,O=GlobalSign nv-sa,C=BE" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524011 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GlobalSign Root R46,O=GlobalSign nv-sa,C=BE" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524033 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Go Daddy Root Certificate Authority - G2,O=GoDaddy.com\\, Inc.,L=Scottsdale,ST=Arizona,C=US" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524054 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=HARICA TLS ECC Root CA 2021,O=Hellenic Academic and Research Institutions CA,C=GR" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524080 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=HARICA TLS RSA Root CA 2021,O=Hellenic Academic and Research Institutions CA,C=GR" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524108 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Hellenic Academic and Research Institutions ECC RootCA 2015,O=Hellenic Academic and Research Institutions Cert. Authority,L=Athens,C=GR" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524134 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Hellenic Academic and Research Institutions RootCA 2015,O=Hellenic Academic and Research Institutions Cert. Authority,L=Athens,C=GR" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524159 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=HiPKI Root CA - G1,O=Chunghwa Telecom Co.\\, Ltd.,C=TW" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524185 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Hongkong Post Root CA 3,O=Hongkong Post,L=Hong Kong,ST=Hong Kong,C=HK" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524211 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=ISRG Root X1,O=Internet Security Research Group,C=US" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524234 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=ISRG Root X2,O=Internet Security Research Group,C=US" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524259 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=IdenTrust Commercial Root CA 1,O=IdenTrust,C=US" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524281 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=IdenTrust Public Sector Root CA 1,O=IdenTrust,C=US" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524305 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Izenpe.com,O=IZENPE S.A.,C=ES" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524334 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Microsec e-Szigno Root CA 2009,O=Microsec Ltd.,L=Budapest,C=HU,1.2.840.113549.1.9.1=#0c10696e666f40652d737a69676e6f2e6875" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524359 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Microsoft ECC Root Certificate Authority 2017,O=Microsoft Corporation,C=US" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524387 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Microsoft RSA Root Certificate Authority 2017,O=Microsoft Corporation,C=US" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524410 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=NAVER Global Root Certification Authority,O=NAVER BUSINESS PLATFORM Corp.,C=KR" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524438 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=NetLock Arany (Class Gold) Főtanúsítvány,OU=Tanúsítványkiadók (Certification Services),O=NetLock Kft.,L=Budapest,C=HU" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524464 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=OISTE WISeKey Global Root GB CA,OU=OISTE Foundation Endorsed,O=WISeKey,C=CH" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524486 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=OISTE WISeKey Global Root GC CA,OU=OISTE Foundation Endorsed,O=WISeKey,C=CH" 2026-03-13T10:38:50.525695590Z I0313 10:38:50.524513 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=QuoVadis Root CA 1 G3,O=QuoVadis Limited,C=BM" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524535 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=QuoVadis Root CA 2,O=QuoVadis Limited,C=BM" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524559 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=QuoVadis Root CA 2 G3,O=QuoVadis Limited,C=BM" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524602 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=QuoVadis Root CA 3,O=QuoVadis Limited,C=BM" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524627 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=QuoVadis Root CA 3 G3,O=QuoVadis Limited,C=BM" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524651 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com EV Root Certification Authority ECC,O=SSL Corporation,L=Houston,ST=Texas,C=US" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524677 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com EV Root Certification Authority RSA R2,O=SSL Corporation,L=Houston,ST=Texas,C=US" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524700 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com Root Certification Authority ECC,O=SSL Corporation,L=Houston,ST=Texas,C=US" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524733 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com Root Certification Authority RSA,O=SSL Corporation,L=Houston,ST=Texas,C=US" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524751 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com TLS ECC Root CA 2022,O=SSL Corporation,C=US" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524771 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com TLS RSA Root CA 2022,O=SSL Corporation,C=US" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524791 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SZAFIR ROOT CA2,O=Krajowa Izba Rozliczeniowa S.A.,C=PL" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524810 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Sectigo Public Server Authentication Root E46,O=Sectigo Limited,C=GB" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524831 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Sectigo Public Server Authentication Root R46,O=Sectigo Limited,C=GB" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524850 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SecureSign Root CA12,O=Cybertrust Japan Co.\\, Ltd.,C=JP" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524897 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SecureSign Root CA14,O=Cybertrust Japan Co.\\, Ltd.,C=JP" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524916 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SecureSign Root CA15,O=Cybertrust Japan Co.\\, Ltd.,C=JP" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524938 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SecureTrust CA,O=SecureTrust Corporation,C=US" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524973 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Secure Global CA,O=SecureTrust Corporation,C=US" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.524995 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Security Communication ECC RootCA1,O=SECOM Trust Systems CO.\\,LTD.,C=JP" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.525018 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="OU=Security Communication RootCA2,O=SECOM Trust Systems CO.\\,LTD.,C=JP" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.525045 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Starfield Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.525072 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.525107 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SwissSign Gold CA - G2,O=SwissSign AG,C=CH" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.525130 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SwissSign RSA TLS Root CA 2022 - 1,O=SwissSign AG,C=CH" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.525152 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=T-TeleSec GlobalRoot Class 2,OU=T-Systems Trust Center,O=T-Systems Enterprise Services GmbH,C=DE" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.525178 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=T-TeleSec GlobalRoot Class 3,OU=T-Systems Trust Center,O=T-Systems Enterprise Services GmbH,C=DE" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.525206 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1,OU=Kamu Sertifikasyon Merkezi - Kamu SM,O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK,L=Gebze - Kocaeli,C=TR" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.525233 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TWCA CYBER Root CA,OU=Root CA,O=TAIWAN-CA,C=TW" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.525256 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TWCA Global Root CA,OU=Root CA,O=TAIWAN-CA,C=TW" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.525277 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TWCA Root Certification Authority,OU=Root CA,O=TAIWAN-CA,C=TW" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.525297 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Telekom Security TLS ECC Root 2020,O=Deutsche Telekom Security GmbH,C=DE" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.525324 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Telekom Security TLS RSA Root 2023,O=Deutsche Telekom Security GmbH,C=DE" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.525344 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TeliaSonera Root CA v1,O=TeliaSonera" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.525369 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Telia Root CA v2,O=Telia Finland Oyj,C=FI" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.525394 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TrustAsia Global Root CA G3,O=TrustAsia Technologies\\, Inc.,C=CN" 2026-03-13T10:38:50.525763212Z I0313 10:38:50.525419 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TrustAsia Global Root CA G4,O=TrustAsia Technologies\\, Inc.,C=CN" 2026-03-13T10:38:50.525799103Z I0313 10:38:50.525440 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TrustAsia TLS ECC Root CA,O=TrustAsia Technologies\\, Inc.,C=CN" 2026-03-13T10:38:50.525799103Z I0313 10:38:50.525463 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TrustAsia TLS RSA Root CA,O=TrustAsia Technologies\\, Inc.,C=CN" 2026-03-13T10:38:50.525799103Z I0313 10:38:50.525487 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Trustwave Global Certification Authority,O=Trustwave Holdings\\, Inc.,L=Chicago,ST=Illinois,C=US" 2026-03-13T10:38:50.525799103Z I0313 10:38:50.525512 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Trustwave Global ECC P256 Certification Authority,O=Trustwave Holdings\\, Inc.,L=Chicago,ST=Illinois,C=US" 2026-03-13T10:38:50.525799103Z I0313 10:38:50.525537 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Trustwave Global ECC P384 Certification Authority,O=Trustwave Holdings\\, Inc.,L=Chicago,ST=Illinois,C=US" 2026-03-13T10:38:50.525799103Z I0313 10:38:50.525560 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TunTrust Root CA,O=Agence Nationale de Certification Electronique,C=TN" 2026-03-13T10:38:50.525864285Z I0313 10:38:50.525829 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=UCA Extended Validation Root,O=UniTrust,C=CN" 2026-03-13T10:38:50.526075522Z I0313 10:38:50.525873 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=UCA Global G2 Root,O=UniTrust,C=CN" 2026-03-13T10:38:50.526075522Z I0313 10:38:50.525903 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=USERTrust ECC Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US" 2026-03-13T10:38:50.526075522Z I0313 10:38:50.525932 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US" 2026-03-13T10:38:50.526075522Z I0313 10:38:50.525952 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="OU=certSIGN ROOT CA,O=certSIGN,C=RO" 2026-03-13T10:38:50.526075522Z I0313 10:38:50.525974 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="OU=certSIGN ROOT CA G2,O=CERTSIGN SA,C=RO" 2026-03-13T10:38:50.526075522Z I0313 10:38:50.526001 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=e-Szigno Root CA 2017,O=Microsec Ltd.,L=Budapest,C=HU,2.5.4.97=#130e56415448552d3233353834343937" 2026-03-13T10:38:50.526075522Z I0313 10:38:50.526027 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="OU=ePKI Root Certification Authority,O=Chunghwa Telecom Co.\\, Ltd.,C=TW" 2026-03-13T10:38:50.526075522Z I0313 10:38:50.526050 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=emSign ECC Root CA - C3,OU=emSign PKI,O=eMudhra Inc,C=US" 2026-03-13T10:38:50.526089622Z I0313 10:38:50.526075 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=emSign ECC Root CA - G3,OU=emSign PKI,O=eMudhra Technologies Limited,C=IN" 2026-03-13T10:38:50.526132964Z I0313 10:38:50.526105 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=emSign Root CA - C1,OU=emSign PKI,O=eMudhra Inc,C=US" 2026-03-13T10:38:50.526142094Z I0313 10:38:50.526133 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=emSign Root CA - G1,OU=emSign PKI,O=eMudhra Technologies Limited,C=IN" 2026-03-13T10:38:50.526212996Z I0313 10:38:50.526157 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=vTrus ECC Root CA,O=iTrusChina Co.\\,Ltd.,C=CN" 2026-03-13T10:38:50.526212996Z I0313 10:38:50.526184 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=vTrus Root CA,O=iTrusChina Co.\\,Ltd.,C=CN" 2026-03-13T10:38:50.527672240Z I0313 10:38:50.526265 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="service-ca.crt" subject="CN=openshift-service-serving-signer@1773398171" 2026-03-13T10:38:50.527672240Z I0313 10:38:50.526505 1 main.go:336] "creating SecretSyncer controller for watching secret" logger="setup" Secret="openshift-config/pull-secret" 2026-03-13T10:38:50.527672240Z I0313 10:38:50.526527 1 main.go:359] "starting manager" logger="setup" 2026-03-13T10:38:50.527672240Z I0313 10:38:50.527638 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" 2026-03-13T10:38:50.527912228Z I0313 10:38:50.527866 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress="127.0.0.1:8080" secure=false 2026-03-13T10:38:50.528922478Z I0313 10:38:50.528871 1 server.go:83] "starting server" name="health probe" addr="[::]:8081" 2026-03-13T10:38:50.529161745Z I0313 10:38:50.529006 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-controller/9c4404e7.operatorframework.io... manager_previous.log0000640000000000000000000007526515154764724036515 0ustar0000000000000000config/pod/openshift-operator-controller/logs/operator-controller-controller-manager-6598bfb6c4-bg6zf2026-03-13T10:36:32.647730918Z I0313 10:36:32.646084 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="OU=certSIGN ROOT CA,O=certSIGN,C=RO" 2026-03-13T10:36:32.647730918Z I0313 10:36:32.646107 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="OU=certSIGN ROOT CA G2,O=CERTSIGN SA,C=RO" 2026-03-13T10:36:32.647730918Z I0313 10:36:32.646138 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=e-Szigno Root CA 2017,O=Microsec Ltd.,L=Budapest,C=HU,2.5.4.97=#130e56415448552d3233353834343937" 2026-03-13T10:36:32.647756039Z I0313 10:36:32.646163 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="OU=ePKI Root Certification Authority,O=Chunghwa Telecom Co.\\, Ltd.,C=TW" 2026-03-13T10:36:32.647756039Z I0313 10:36:32.646186 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=emSign ECC Root CA - C3,OU=emSign PKI,O=eMudhra Inc,C=US" 2026-03-13T10:36:32.647756039Z I0313 10:36:32.646206 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=emSign ECC Root CA - G3,OU=emSign PKI,O=eMudhra Technologies Limited,C=IN" 2026-03-13T10:36:32.647756039Z I0313 10:36:32.646227 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=emSign Root CA - C1,OU=emSign PKI,O=eMudhra Inc,C=US" 2026-03-13T10:36:32.647756039Z I0313 10:36:32.646254 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=emSign Root CA - G1,OU=emSign PKI,O=eMudhra Technologies Limited,C=IN" 2026-03-13T10:36:32.647756039Z I0313 10:36:32.646273 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=vTrus ECC Root CA,O=iTrusChina Co.\\,Ltd.,C=CN" 2026-03-13T10:36:32.647756039Z I0313 10:36:32.646296 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=vTrus Root CA,O=iTrusChina Co.\\,Ltd.,C=CN" 2026-03-13T10:36:32.647756039Z I0313 10:36:32.646377 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="service-ca.crt" subject="CN=openshift-service-serving-signer@1773398171" 2026-03-13T10:36:32.647756039Z I0313 10:36:32.646739 1 main.go:336] "creating SecretSyncer controller for watching secret" logger="setup" Secret="openshift-config/pull-secret" 2026-03-13T10:36:32.647756039Z I0313 10:36:32.646769 1 main.go:359] "starting manager" logger="setup" 2026-03-13T10:36:32.647756039Z I0313 10:36:32.647263 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" 2026-03-13T10:36:32.647756039Z I0313 10:36:32.647355 1 server.go:83] "starting server" name="health probe" addr="[::]:8081" 2026-03-13T10:36:32.647756039Z I0313 10:36:32.647484 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress="127.0.0.1:8080" secure=false 2026-03-13T10:36:32.647756039Z I0313 10:36:32.647552 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-controller/9c4404e7.operatorframework.io... 2026-03-13T10:36:32.665701113Z I0313 10:36:32.661950 1 leaderelection.go:268] successfully acquired lease openshift-operator-controller/9c4404e7.operatorframework.io 2026-03-13T10:36:32.665701113Z I0313 10:36:32.662293 1 controller.go:175] "Starting EventSource" controller="clusterextension" controllerGroup="olm.operatorframework.io" controllerKind="ClusterExtension" source="kind source: *v1.ClusterExtension" 2026-03-13T10:36:32.665701113Z I0313 10:36:32.662306 1 controller.go:175] "Starting EventSource" controller="clusterextension" controllerGroup="olm.operatorframework.io" controllerKind="ClusterExtension" source="kind source: *v1.ClusterCatalog" 2026-03-13T10:36:32.665701113Z I0313 10:36:32.662313 1 controller.go:183] "Starting Controller" controller="clusterextension" controllerGroup="olm.operatorframework.io" controllerKind="ClusterExtension" 2026-03-13T10:36:32.665701113Z I0313 10:36:32.662728 1 controller.go:175] "Starting EventSource" controller="secret" controllerGroup="" controllerKind="Secret" source="kind source: *v1.Secret" 2026-03-13T10:36:32.665701113Z I0313 10:36:32.662736 1 controller.go:183] "Starting Controller" controller="secret" controllerGroup="" controllerKind="Secret" 2026-03-13T10:36:32.665701113Z I0313 10:36:32.662894 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T10:36:32.665701113Z I0313 10:36:32.662905 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T10:36:32.665701113Z I0313 10:36:32.663070 1 controller.go:175] "Starting EventSource" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" source="kind source: *v1.ClusterCatalog" 2026-03-13T10:36:32.665701113Z I0313 10:36:32.663077 1 controller.go:183] "Starting Controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" 2026-03-13T10:36:32.665701113Z I0313 10:36:32.664326 1 reflector.go:368] Caches populated for *v1.Secret from pkg/cache/internal/informers.go:106 2026-03-13T10:36:32.665701113Z I0313 10:36:32.664747 1 reflector.go:368] Caches populated for *v1.ClusterCatalog from pkg/cache/internal/informers.go:106 2026-03-13T10:36:32.665701113Z I0313 10:36:32.664773 1 reflector.go:368] Caches populated for *v1.ClusterExtension from pkg/cache/internal/informers.go:106 2026-03-13T10:36:32.763448512Z I0313 10:36:32.763369 1 controller.go:217] "Starting workers" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" worker count=1 2026-03-13T10:36:32.763488713Z I0313 10:36:32.763443 1 controller.go:217] "Starting workers" controller="secret" controllerGroup="" controllerKind="Secret" worker count=1 2026-03-13T10:36:32.763548994Z I0313 10:36:32.763517 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="4568cabc-bbbf-4744-9db2-687c8ab53f62" 2026-03-13T10:36:32.763577845Z I0313 10:36:32.763561 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="4568cabc-bbbf-4744-9db2-687c8ab53f62" 2026-03-13T10:36:32.763630526Z I0313 10:36:32.763606 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="3e1bf543-5f2f-4623-adc1-2c97cd42ba5f" 2026-03-13T10:36:32.763630526Z I0313 10:36:32.763621 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="3e1bf543-5f2f-4623-adc1-2c97cd42ba5f" 2026-03-13T10:36:32.763641837Z I0313 10:36:32.763635 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="26c4f3bc-7ae5-4820-a283-23b4e9f3bd52" 2026-03-13T10:36:32.763688178Z I0313 10:36:32.763671 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="26c4f3bc-7ae5-4820-a283-23b4e9f3bd52" 2026-03-13T10:36:32.763696088Z I0313 10:36:32.763684 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="e5c1333b-1528-43c2-be6e-87b7a11c6ff2" 2026-03-13T10:36:32.763702778Z I0313 10:36:32.763692 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="e5c1333b-1528-43c2-be6e-87b7a11c6ff2" 2026-03-13T10:36:32.763722339Z I0313 10:36:32.763706 1 controller.go:217] "Starting workers" controller="clusterextension" controllerGroup="olm.operatorframework.io" controllerKind="ClusterExtension" worker count=1 2026-03-13T10:36:32.764033277Z I0313 10:36:32.763996 1 pull_secret_controller.go:94] "saved global pull secret data locally" controller="secret" controllerGroup="" controllerKind="Secret" Secret="openshift-config/pull-secret" namespace="openshift-config" name="pull-secret" reconcileID="84db8b8d-48e6-47b1-8964-b098ea548cd8" 2026-03-13T10:36:32.766050362Z I0313 10:36:32.765939 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from pkg/cache/internal/informers.go:106 2026-03-13T10:36:44.268698117Z I0313 10:36:44.265158 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="b715688a-9830-4a3a-b316-550902c8b389" 2026-03-13T10:36:44.268698117Z I0313 10:36:44.265213 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="b715688a-9830-4a3a-b316-550902c8b389" 2026-03-13T10:36:44.277650919Z I0313 10:36:44.277167 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="b2741833-d12b-475f-b1bb-be7fdd6cf2b8" 2026-03-13T10:36:44.277650919Z I0313 10:36:44.277223 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="b2741833-d12b-475f-b1bb-be7fdd6cf2b8" 2026-03-13T10:36:44.329705084Z I0313 10:36:44.328361 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="5f1061c3-45a6-4d30-b77b-813623e5535c" 2026-03-13T10:36:44.329705084Z I0313 10:36:44.328413 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="5f1061c3-45a6-4d30-b77b-813623e5535c" 2026-03-13T10:36:44.448867840Z I0313 10:36:44.447692 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="00ddbbdb-9fc8-4968-89d6-30ada4d3093d" 2026-03-13T10:36:44.448867840Z I0313 10:36:44.447735 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="00ddbbdb-9fc8-4968-89d6-30ada4d3093d" 2026-03-13T10:36:44.798469857Z I0313 10:36:44.798148 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="598ce30e-0e62-4b77-ba47-3c7e8744382c" 2026-03-13T10:36:44.798469857Z I0313 10:36:44.798198 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="598ce30e-0e62-4b77-ba47-3c7e8744382c" 2026-03-13T10:36:44.870298456Z I0313 10:36:44.870185 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="f2314d81-47d7-4762-aaae-261460544f36" 2026-03-13T10:36:44.870298456Z I0313 10:36:44.870243 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="f2314d81-47d7-4762-aaae-261460544f36" 2026-03-13T10:36:44.945789384Z I0313 10:36:44.944890 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="fe1790d0-246e-4e75-b368-a3f126a4e8ff" 2026-03-13T10:36:44.945789384Z I0313 10:36:44.944932 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="fe1790d0-246e-4e75-b368-a3f126a4e8ff" 2026-03-13T10:36:44.990952313Z I0313 10:36:44.990576 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="79eac133-d284-477c-aaa6-d29db58a9efb" 2026-03-13T10:36:44.990952313Z I0313 10:36:44.990646 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="79eac133-d284-477c-aaa6-d29db58a9efb" 2026-03-13T10:36:45.028094535Z I0313 10:36:45.024044 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="19a94f83-aeda-4ffc-918f-12ae01d08f9c" 2026-03-13T10:36:45.028094535Z I0313 10:36:45.024092 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="19a94f83-aeda-4ffc-918f-12ae01d08f9c" 2026-03-13T10:36:45.121710632Z I0313 10:36:45.121531 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="4a89ab3e-53aa-458e-9b2b-a8ae276e3489" 2026-03-13T10:36:45.121763744Z I0313 10:36:45.121717 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="4a89ab3e-53aa-458e-9b2b-a8ae276e3489" 2026-03-13T10:36:45.549619503Z I0313 10:36:45.547092 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="909a015c-5db2-4ab9-8825-eb9add76e77b" 2026-03-13T10:36:45.549619503Z I0313 10:36:45.547138 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="909a015c-5db2-4ab9-8825-eb9add76e77b" 2026-03-13T10:36:45.742617182Z I0313 10:36:45.742454 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="229a0276-e432-434d-b4e8-a29e659f44ea" 2026-03-13T10:36:45.742617182Z I0313 10:36:45.742497 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="229a0276-e432-434d-b4e8-a29e659f44ea" 2026-03-13T10:36:45.908461939Z I0313 10:36:45.903723 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="9188727c-c35e-4a83-94a4-e1f9dc372c85" 2026-03-13T10:36:45.908461939Z I0313 10:36:45.903767 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="9188727c-c35e-4a83-94a4-e1f9dc372c85" 2026-03-13T10:36:45.953295529Z I0313 10:36:45.952524 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="b4677f35-15ef-4cf7-af32-844d23772d0c" 2026-03-13T10:36:45.953295529Z I0313 10:36:45.952606 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="b4677f35-15ef-4cf7-af32-844d23772d0c" 2026-03-13T10:36:46.038667964Z I0313 10:36:46.036718 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="1444095f-4851-4699-b61f-90b10f0ea82c" 2026-03-13T10:36:46.038667964Z I0313 10:36:46.036802 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="1444095f-4851-4699-b61f-90b10f0ea82c" 2026-03-13T10:36:46.171193641Z I0313 10:36:46.170789 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="a368f351-bc4c-4c2e-a6b9-a82f37bfa0f6" 2026-03-13T10:36:46.171193641Z I0313 10:36:46.170847 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="a368f351-bc4c-4c2e-a6b9-a82f37bfa0f6" 2026-03-13T10:36:46.221749976Z I0313 10:36:46.220353 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="3160dec7-eb24-4b7d-98ca-8d70b60a38e9" 2026-03-13T10:36:46.221749976Z I0313 10:36:46.220403 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="3160dec7-eb24-4b7d-98ca-8d70b60a38e9" 2026-03-13T10:36:46.385013182Z I0313 10:36:46.377852 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="fe450353-a4f9-421e-9074-6635bef0fbe0" 2026-03-13T10:36:46.385013182Z I0313 10:36:46.377898 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="fe450353-a4f9-421e-9074-6635bef0fbe0" 2026-03-13T10:36:46.610717115Z I0313 10:36:46.610316 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="6c8157a3-0c3d-48f7-8130-6286815a68c0" 2026-03-13T10:36:46.610717115Z I0313 10:36:46.610409 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="6c8157a3-0c3d-48f7-8130-6286815a68c0" 2026-03-13T10:36:46.874026891Z I0313 10:36:46.872755 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="ba191dda-6a34-440f-b2d9-3b87ad0c0470" 2026-03-13T10:36:46.874026891Z I0313 10:36:46.872817 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="ba191dda-6a34-440f-b2d9-3b87ad0c0470" 2026-03-13T10:36:47.279741752Z I0313 10:36:47.279173 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="ae5c586a-df1c-4d1a-bdfe-fc8b183b84e8" 2026-03-13T10:36:47.279741752Z I0313 10:36:47.279221 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="ae5c586a-df1c-4d1a-bdfe-fc8b183b84e8" 2026-03-13T10:36:47.526829142Z I0313 10:36:47.525957 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="bc86d101-c1bb-46b8-93a1-8b23883cd100" 2026-03-13T10:36:47.526829142Z I0313 10:36:47.526013 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="bc86d101-c1bb-46b8-93a1-8b23883cd100" 2026-03-13T10:36:47.817050556Z I0313 10:36:47.814744 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="583f5f1f-1395-433b-aa71-9e2b6a5a4e29" 2026-03-13T10:36:47.817050556Z I0313 10:36:47.814801 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="583f5f1f-1395-433b-aa71-9e2b6a5a4e29" 2026-03-13T10:36:47.895275858Z I0313 10:36:47.895167 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="a875148f-a110-479c-af9d-e449cac947cf" 2026-03-13T10:36:47.895275858Z I0313 10:36:47.895224 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="a875148f-a110-479c-af9d-e449cac947cf" 2026-03-13T10:36:48.003473368Z I0313 10:36:48.003361 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="0e68c4a1-d9e1-497d-9cf8-504d3ddad457" 2026-03-13T10:36:48.003473368Z I0313 10:36:48.003414 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="0e68c4a1-d9e1-497d-9cf8-504d3ddad457" 2026-03-13T10:36:48.049677195Z I0313 10:36:48.047154 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="f33390c6-6809-488d-a847-9eb128839135" 2026-03-13T10:36:48.049677195Z I0313 10:36:48.047206 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="f33390c6-6809-488d-a847-9eb128839135" 2026-03-13T10:37:32.674440246Z E0313 10:37:32.674331 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-13T10:38:32.679147302Z E0313 10:38:32.678965 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io) 2026-03-13T10:38:45.671655934Z I0313 10:38:45.670996 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition 2026-03-13T10:38:45.671655934Z E0313 10:38:45.671132 1 main.go:362] "problem running manager" err="leader election lost" logger="setup" operator-controller-controller-manager-6598bfb6c4-bg6zf.json0000640000000000000000000002474315154764724032366 0ustar0000000000000000config/pod/openshift-operator-controller{"metadata":{"name":"operator-controller-controller-manager-6598bfb6c4-bg6zf","generateName":"operator-controller-controller-manager-6598bfb6c4-","namespace":"openshift-operator-controller","uid":"b10584c2-ef04-4649-bcb6-9222c9530c3f","resourceVersion":"8512","creationTimestamp":"2026-03-13T10:36:24Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"6598bfb6c4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.38/23\"],\"mac_address\":\"0a:58:0a:80:00:26\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.38/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.38\"\n ],\n \"mac\": \"0a:58:0a:80:00:26\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-6598bfb6c4","uid":"a15f090c-b32e-4537-828d-2dcad8a71b6b","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-zsswm","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-zsswm","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-zsswm","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:33Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:24Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:56Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:56Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:24Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.38","podIPs":[{"ip":"10.128.0.38"}],"startTime":"2026-03-13T10:36:24Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-13T10:36:32Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://9399008275bd9f71491c5fcb5ffc2a50f02e98d1575d51521c59927fcc8b68b4","started":true,"volumeMounts":[{"name":"kube-api-access-zsswm","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-13T10:38:50Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"erKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"0e68c4a1-d9e1-497d-9cf8-504d3ddad457\"\nI0313 10:36:48.003414 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"0e68c4a1-d9e1-497d-9cf8-504d3ddad457\"\nI0313 10:36:48.047154 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"f33390c6-6809-488d-a847-9eb128839135\"\nI0313 10:36:48.047206 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"f33390c6-6809-488d-a847-9eb128839135\"\nE0313 10:37:32.674331 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0313 10:38:32.678965 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI0313 10:38:45.670996 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE0313 10:38:45.671132 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-13T10:36:32Z","finishedAt":"2026-03-13T10:38:45Z","containerID":"cri-o://f661d164e1cae288da9b5b814f572be1703c2513d35aac45b2b22784229191e4"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","containerID":"cri-o://2a9aaa81e2cc4ad44480999dff8ac1b2c80678408fd67b6fb365310487f92570","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-zsswm","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/logs/catalogd-controller-manager-7f8b8b6f4c-f46qd/manager_current.log0000640000000000000000000000426515154764724031665 0ustar00000000000000002026-03-13T10:38:50.390818156Z I0313 10:38:50.390745 1 certwatcher.go:161] "Updated current TLS certificate" logger="controller-runtime.certwatcher" 2026-03-13T10:38:50.404151161Z I0313 10:38:50.404089 1 main.go:303] "creating SecretSyncer controller for watching secret" logger="setup" Secret="openshift-config/pull-secret" 2026-03-13T10:38:50.407167042Z I0313 10:38:50.406760 1 webhook.go:163] "Registering a mutating webhook" logger="controller-runtime.builder" GVK="olm.operatorframework.io/v1, Kind=ClusterCatalog" path="/mutate-olm-operatorframework-io-v1-clustercatalog" 2026-03-13T10:38:50.407167042Z I0313 10:38:50.406935 1 server.go:183] "Registering webhook" logger="controller-runtime.webhook" path="/mutate-olm-operatorframework-io-v1-clustercatalog" 2026-03-13T10:38:50.407167042Z I0313 10:38:50.406959 1 webhook.go:225] "skip registering a validating webhook, object does not implement admission.Validator or WithValidator wasn't called" logger="controller-runtime.builder" GVK="olm.operatorframework.io/v1, Kind=ClusterCatalog" 2026-03-13T10:38:50.407167042Z I0313 10:38:50.407057 1 main.go:349] "starting mutating webhook manager" logger="setup" 2026-03-13T10:38:50.407199903Z I0313 10:38:50.407170 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" 2026-03-13T10:38:50.409434371Z I0313 10:38:50.407415 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress="127.0.0.1:8080" secure=false 2026-03-13T10:38:50.409434371Z I0313 10:38:50.407512 1 server.go:83] "starting server" name="health probe" addr="[::]:8081" 2026-03-13T10:38:50.409434371Z I0313 10:38:50.407626 1 server.go:191] "Starting webhook server" logger="controller-runtime.webhook" 2026-03-13T10:38:50.409434371Z I0313 10:38:50.407929 1 server.go:242] "Serving webhook server" logger="controller-runtime.webhook" host="" port=9443 2026-03-13T10:38:50.409434371Z I0313 10:38:50.408164 1 server.go:96] "starting server" kind="catalogs" addr="[::]:8443" 2026-03-13T10:38:50.409434371Z I0313 10:38:50.408262 1 leaderelection.go:254] attempting to acquire leader lease openshift-catalogd/catalogd-operator-lock... kube-rbac-proxy_current.log0000640000000000000000000001620515154764724033203 0ustar0000000000000000config/pod/openshift-catalogd/logs/catalogd-controller-manager-7f8b8b6f4c-f46qd2026-03-13T10:36:33.003651315Z I0313 10:36:33.003355 1 flags.go:64] FLAG: --add-dir-header="false" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003482 1 flags.go:64] FLAG: --allow-paths="[]" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003493 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003502 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003509 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003521 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003526 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003530 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003537 1 flags.go:64] FLAG: --client-ca-file="" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003541 1 flags.go:64] FLAG: --config-file="" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003544 1 flags.go:64] FLAG: --help="false" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003549 1 flags.go:64] FLAG: --http2-disable="true" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003556 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003562 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003566 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003571 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003575 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003581 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003616 1 flags.go:64] FLAG: --kubeconfig="" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003620 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003624 1 flags.go:64] FLAG: --log-dir="" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003631 1 flags.go:64] FLAG: --log-file="" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003636 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-03-13T10:36:33.003651315Z I0313 10:36:33.003641 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003646 1 flags.go:64] FLAG: --logtostderr="true" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003652 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003656 1 flags.go:64] FLAG: --oidc-clientID="" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003660 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003664 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003671 1 flags.go:64] FLAG: --oidc-issuer="" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003675 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003683 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003687 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003691 1 flags.go:64] FLAG: --one-output="false" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003695 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003699 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:7443" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003703 1 flags.go:64] FLAG: --skip-headers="false" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003706 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003713 1 flags.go:64] FLAG: --stderrthreshold="" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003717 1 flags.go:64] FLAG: --tls-cert-file="" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003721 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003726 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003730 1 flags.go:64] FLAG: --tls-private-key-file="" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003733 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003739 1 flags.go:64] FLAG: --upstream="http://127.0.0.1:8080/" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003743 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003749 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003753 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003756 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003760 1 flags.go:64] FLAG: --v="2" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003763 1 flags.go:64] FLAG: --version="false" 2026-03-13T10:36:33.003831480Z I0313 10:36:33.003769 1 flags.go:64] FLAG: --vmodule="" 2026-03-13T10:36:33.003831480Z W0313 10:36:33.003775 1 options.go:150] 2026-03-13T10:36:33.003831480Z ==== Deprecation Warning ====================== 2026-03-13T10:36:33.003831480Z 2026-03-13T10:36:33.003831480Z Insecure listen address will be removed. 2026-03-13T10:36:33.003831480Z Using --insecure-listen-address won't be possible! 2026-03-13T10:36:33.003831480Z 2026-03-13T10:36:33.003831480Z The ability to run kube-rbac-proxy without TLS certificates will be removed. 2026-03-13T10:36:33.003831480Z Not using --tls-cert-file and --tls-private-key-file won't be possible! 2026-03-13T10:36:33.003831480Z 2026-03-13T10:36:33.003831480Z For more information, please go to https://github.com/brancz/kube-rbac-proxy/issues/187 2026-03-13T10:36:33.003831480Z 2026-03-13T10:36:33.003831480Z =============================================== 2026-03-13T10:36:33.003831480Z 2026-03-13T10:36:33.003831480Z 2026-03-13T10:36:33.003831480Z W0313 10:36:33.003785 1 deprecated.go:66] 2026-03-13T10:36:33.003831480Z ==== Removed Flag Warning ====================== 2026-03-13T10:36:33.003831480Z 2026-03-13T10:36:33.003831480Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-13T10:36:33.003831480Z 2026-03-13T10:36:33.003831480Z =============================================== 2026-03-13T10:36:33.003831480Z 2026-03-13T10:36:33.007619792Z I0313 10:36:33.004826 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-13T10:36:33.012421832Z I0313 10:36:33.011266 1 kube-rbac-proxy.go:331] Generating self signed cert as no cert is provided 2026-03-13T10:36:33.334482385Z I0313 10:36:33.334413 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:7443 2026-03-13T10:36:33.335326018Z I0313 10:36:33.335302 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:7443 config/pod/openshift-catalogd/logs/catalogd-controller-manager-7f8b8b6f4c-f46qd/manager_previous.log0000640000000000000000000012071315154764724032054 0ustar00000000000000002026-03-13T10:36:45.743728823Z I0313 10:36:45.743707 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="a655cafe-576c-4a89-99fa-dc8d7334eb83" 2026-03-13T10:36:45.743802235Z I0313 10:36:45.743781 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="a655cafe-576c-4a89-99fa-dc8d7334eb83" 2026-03-13T10:36:45.904730668Z I0313 10:36:45.903047 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="a655cafe-576c-4a89-99fa-dc8d7334eb83" 2026-03-13T10:36:45.904730668Z E0313 10:36:45.903122 1 controller.go:316] "Reconciler error" err="source catalog content: error resolving canonical reference: error creating image source: pinging container registry registry.redhat.io: Get \"https://registry.redhat.io/v2/\": dial tcp: lookup registry.redhat.io on 172.30.0.10:53: read udp 10.128.0.37:38892->172.30.0.10:53: read: connection refused" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="a655cafe-576c-4a89-99fa-dc8d7334eb83" 2026-03-13T10:36:45.904730668Z I0313 10:36:45.903175 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="926706a3-0f4f-4669-adb3-e426084795e4" 2026-03-13T10:36:45.904730668Z I0313 10:36:45.903214 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="926706a3-0f4f-4669-adb3-e426084795e4" 2026-03-13T10:36:45.904730668Z I0313 10:36:45.903267 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="926706a3-0f4f-4669-adb3-e426084795e4" 2026-03-13T10:36:45.950844663Z I0313 10:36:45.949939 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="926706a3-0f4f-4669-adb3-e426084795e4" 2026-03-13T10:36:45.950844663Z E0313 10:36:45.950006 1 controller.go:316] "Reconciler error" err="source catalog content: error resolving canonical reference: error creating image source: pinging container registry registry.redhat.io: Get \"https://registry.redhat.io/v2/\": dial tcp: lookup registry.redhat.io on 172.30.0.10:53: read udp 10.128.0.37:57563->172.30.0.10:53: read: connection refused" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="926706a3-0f4f-4669-adb3-e426084795e4" 2026-03-13T10:36:45.950844663Z I0313 10:36:45.950049 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="c508c799-cb71-4f37-ae5f-0d06ff70ce4c" 2026-03-13T10:36:45.950844663Z I0313 10:36:45.950090 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="c508c799-cb71-4f37-ae5f-0d06ff70ce4c" 2026-03-13T10:36:45.950844663Z I0313 10:36:45.950131 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="c508c799-cb71-4f37-ae5f-0d06ff70ce4c" 2026-03-13T10:36:46.038470968Z I0313 10:36:46.036309 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="c508c799-cb71-4f37-ae5f-0d06ff70ce4c" 2026-03-13T10:36:46.038470968Z E0313 10:36:46.036375 1 controller.go:316] "Reconciler error" err="source catalog content: error resolving canonical reference: error creating image source: pinging container registry registry.redhat.io: Get \"https://registry.redhat.io/v2/\": dial tcp: lookup registry.redhat.io on 172.30.0.10:53: read udp 10.128.0.37:34783->172.30.0.10:53: read: connection refused" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="c508c799-cb71-4f37-ae5f-0d06ff70ce4c" 2026-03-13T10:36:46.038470968Z I0313 10:36:46.036417 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="75d697e6-d4c1-4e1d-9765-d5dcf81c155c" 2026-03-13T10:36:46.038470968Z I0313 10:36:46.036450 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="75d697e6-d4c1-4e1d-9765-d5dcf81c155c" 2026-03-13T10:36:46.038470968Z I0313 10:36:46.036488 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="75d697e6-d4c1-4e1d-9765-d5dcf81c155c" 2026-03-13T10:36:46.169652529Z I0313 10:36:46.167501 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="75d697e6-d4c1-4e1d-9765-d5dcf81c155c" 2026-03-13T10:36:46.169652529Z E0313 10:36:46.167623 1 controller.go:316] "Reconciler error" err="source catalog content: error resolving canonical reference: error creating image source: pinging container registry registry.redhat.io: Get \"https://registry.redhat.io/v2/\": dial tcp: lookup registry.redhat.io on 172.30.0.10:53: read udp 10.128.0.37:51396->172.30.0.10:53: read: connection refused" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="75d697e6-d4c1-4e1d-9765-d5dcf81c155c" 2026-03-13T10:36:46.169652529Z I0313 10:36:46.167670 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="753de2ef-f345-40c2-b343-d285ededb83a" 2026-03-13T10:36:46.169652529Z I0313 10:36:46.167702 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="753de2ef-f345-40c2-b343-d285ededb83a" 2026-03-13T10:36:46.169652529Z I0313 10:36:46.167759 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="753de2ef-f345-40c2-b343-d285ededb83a" 2026-03-13T10:36:46.221576771Z I0313 10:36:46.220301 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="753de2ef-f345-40c2-b343-d285ededb83a" 2026-03-13T10:36:46.221576771Z E0313 10:36:46.220357 1 controller.go:316] "Reconciler error" err="source catalog content: error resolving canonical reference: error creating image source: pinging container registry registry.redhat.io: Get \"https://registry.redhat.io/v2/\": dial tcp: lookup registry.redhat.io on 172.30.0.10:53: read udp 10.128.0.37:37785->172.30.0.10:53: read: connection refused" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="753de2ef-f345-40c2-b343-d285ededb83a" 2026-03-13T10:36:46.221576771Z I0313 10:36:46.220399 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="53690bc5-3d01-47cd-b873-23f8de6a4a79" 2026-03-13T10:36:46.221576771Z I0313 10:36:46.220427 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="53690bc5-3d01-47cd-b873-23f8de6a4a79" 2026-03-13T10:36:46.221576771Z I0313 10:36:46.220477 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="53690bc5-3d01-47cd-b873-23f8de6a4a79" 2026-03-13T10:36:46.379884934Z I0313 10:36:46.376906 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="53690bc5-3d01-47cd-b873-23f8de6a4a79" 2026-03-13T10:36:46.379884934Z E0313 10:36:46.376984 1 controller.go:316] "Reconciler error" err="source catalog content: error resolving canonical reference: error creating image source: pinging container registry registry.redhat.io: Get \"https://registry.redhat.io/v2/\": dial tcp: lookup registry.redhat.io on 172.30.0.10:53: read udp 10.128.0.37:48509->172.30.0.10:53: read: connection refused" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="53690bc5-3d01-47cd-b873-23f8de6a4a79" 2026-03-13T10:36:46.379884934Z I0313 10:36:46.377051 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="d4059f64-7829-45c8-b0e8-2a64c6371ecd" 2026-03-13T10:36:46.379884934Z I0313 10:36:46.377085 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="d4059f64-7829-45c8-b0e8-2a64c6371ecd" 2026-03-13T10:36:46.379884934Z I0313 10:36:46.377137 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="d4059f64-7829-45c8-b0e8-2a64c6371ecd" 2026-03-13T10:36:46.611512876Z I0313 10:36:46.611439 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="d4059f64-7829-45c8-b0e8-2a64c6371ecd" 2026-03-13T10:36:46.611694581Z E0313 10:36:46.611664 1 controller.go:316] "Reconciler error" err="source catalog content: error resolving canonical reference: error creating image source: pinging container registry registry.redhat.io: Get \"https://registry.redhat.io/v2/\": dial tcp: lookup registry.redhat.io on 172.30.0.10:53: read udp 10.128.0.37:42367->172.30.0.10:53: read: connection refused" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="d4059f64-7829-45c8-b0e8-2a64c6371ecd" 2026-03-13T10:36:46.612258806Z I0313 10:36:46.612236 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="f6080aeb-f0b9-4a72-aa5e-a4bbceb80a06" 2026-03-13T10:36:46.612326738Z I0313 10:36:46.612306 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="f6080aeb-f0b9-4a72-aa5e-a4bbceb80a06" 2026-03-13T10:36:46.612419221Z I0313 10:36:46.612400 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="f6080aeb-f0b9-4a72-aa5e-a4bbceb80a06" 2026-03-13T10:36:46.874729230Z I0313 10:36:46.874563 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="f6080aeb-f0b9-4a72-aa5e-a4bbceb80a06" 2026-03-13T10:36:46.874729230Z E0313 10:36:46.874690 1 controller.go:316] "Reconciler error" err="source catalog content: error resolving canonical reference: error creating image source: pinging container registry registry.redhat.io: Get \"https://registry.redhat.io/v2/\": dial tcp: lookup registry.redhat.io on 172.30.0.10:53: read udp 10.128.0.37:50197->172.30.0.10:53: read: connection refused" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="f6080aeb-f0b9-4a72-aa5e-a4bbceb80a06" 2026-03-13T10:36:46.874760131Z I0313 10:36:46.874745 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="b8bbcdd5-fc84-418e-adca-083fc09a5f3c" 2026-03-13T10:36:46.874821123Z I0313 10:36:46.874785 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="b8bbcdd5-fc84-418e-adca-083fc09a5f3c" 2026-03-13T10:36:46.874854634Z I0313 10:36:46.874836 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="b8bbcdd5-fc84-418e-adca-083fc09a5f3c" 2026-03-13T10:36:47.285274762Z I0313 10:36:47.283138 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="b8bbcdd5-fc84-418e-adca-083fc09a5f3c" 2026-03-13T10:36:47.285274762Z E0313 10:36:47.283217 1 controller.go:316] "Reconciler error" err="source catalog content: error resolving canonical reference: error creating image source: pinging container registry registry.redhat.io: Get \"https://registry.redhat.io/v2/\": dial tcp: lookup registry.redhat.io on 172.30.0.10:53: read udp 10.128.0.37:40719->172.30.0.10:53: read: connection refused" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="b8bbcdd5-fc84-418e-adca-083fc09a5f3c" 2026-03-13T10:36:47.285274762Z I0313 10:36:47.283266 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="5eef602a-d225-4694-9b35-3980534056c5" 2026-03-13T10:36:47.285274762Z I0313 10:36:47.283307 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="5eef602a-d225-4694-9b35-3980534056c5" 2026-03-13T10:36:47.285274762Z I0313 10:36:47.283361 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="5eef602a-d225-4694-9b35-3980534056c5" 2026-03-13T10:36:47.553609395Z I0313 10:36:47.551472 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="5eef602a-d225-4694-9b35-3980534056c5" 2026-03-13T10:36:47.553609395Z E0313 10:36:47.551546 1 controller.go:316] "Reconciler error" err="source catalog content: error resolving canonical reference: error creating image source: pinging container registry registry.redhat.io: Get \"https://registry.redhat.io/v2/\": dial tcp: lookup registry.redhat.io on 172.30.0.10:53: read udp 10.128.0.37:56672->172.30.0.10:53: read: connection refused" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="5eef602a-d225-4694-9b35-3980534056c5" 2026-03-13T10:36:47.553609395Z I0313 10:36:47.551622 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="4b4e9b40-40a9-4a98-985b-cce23fd2c19c" 2026-03-13T10:36:47.553609395Z I0313 10:36:47.551661 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="4b4e9b40-40a9-4a98-985b-cce23fd2c19c" 2026-03-13T10:36:47.553609395Z I0313 10:36:47.551737 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="4b4e9b40-40a9-4a98-985b-cce23fd2c19c" 2026-03-13T10:36:47.823427898Z I0313 10:36:47.814427 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="4b4e9b40-40a9-4a98-985b-cce23fd2c19c" 2026-03-13T10:36:47.823427898Z E0313 10:36:47.814565 1 controller.go:316] "Reconciler error" err="source catalog content: error resolving canonical reference: error creating image source: pinging container registry registry.redhat.io: Get \"https://registry.redhat.io/v2/\": dial tcp: lookup registry.redhat.io on 172.30.0.10:53: read udp 10.128.0.37:48239->172.30.0.10:53: read: connection refused" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="4b4e9b40-40a9-4a98-985b-cce23fd2c19c" 2026-03-13T10:36:47.823427898Z I0313 10:36:47.814695 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="e7008c24-8ca5-43e8-b296-67ab670f55c6" 2026-03-13T10:36:47.823427898Z I0313 10:36:47.814736 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="e7008c24-8ca5-43e8-b296-67ab670f55c6" 2026-03-13T10:36:47.823427898Z I0313 10:36:47.814788 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="e7008c24-8ca5-43e8-b296-67ab670f55c6" 2026-03-13T10:36:47.894335972Z I0313 10:36:47.894062 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="e7008c24-8ca5-43e8-b296-67ab670f55c6" 2026-03-13T10:36:47.894335972Z E0313 10:36:47.894144 1 controller.go:316] "Reconciler error" err="source catalog content: error resolving canonical reference: error creating image source: pinging container registry registry.redhat.io: Get \"https://registry.redhat.io/v2/\": dial tcp: lookup registry.redhat.io on 172.30.0.10:53: read udp 10.128.0.37:49297->172.30.0.10:53: read: connection refused" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="e7008c24-8ca5-43e8-b296-67ab670f55c6" 2026-03-13T10:36:47.894335972Z I0313 10:36:47.894194 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="3a827944-d932-4b94-8b79-6a33c7345c13" 2026-03-13T10:36:47.894335972Z I0313 10:36:47.894254 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="3a827944-d932-4b94-8b79-6a33c7345c13" 2026-03-13T10:36:47.894335972Z I0313 10:36:47.894313 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="3a827944-d932-4b94-8b79-6a33c7345c13" 2026-03-13T10:36:47.996067428Z I0313 10:36:47.995966 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="3a827944-d932-4b94-8b79-6a33c7345c13" 2026-03-13T10:36:47.996120350Z E0313 10:36:47.996063 1 controller.go:316] "Reconciler error" err="source catalog content: error resolving canonical reference: error creating image source: pinging container registry registry.redhat.io: Get \"https://registry.redhat.io/v2/\": dial tcp: lookup registry.redhat.io on 172.30.0.10:53: read udp 10.128.0.37:55591->172.30.0.10:53: read: connection refused" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="3a827944-d932-4b94-8b79-6a33c7345c13" 2026-03-13T10:36:47.996155781Z I0313 10:36:47.996128 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="a2003d8a-14f3-407c-ae18-44dbddbdd840" 2026-03-13T10:36:47.997141887Z I0313 10:36:47.996168 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="a2003d8a-14f3-407c-ae18-44dbddbdd840" 2026-03-13T10:36:47.997141887Z I0313 10:36:47.996243 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="a2003d8a-14f3-407c-ae18-44dbddbdd840" 2026-03-13T10:36:48.046011936Z I0313 10:36:48.045911 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="a2003d8a-14f3-407c-ae18-44dbddbdd840" 2026-03-13T10:36:48.046067088Z E0313 10:36:48.046010 1 controller.go:316] "Reconciler error" err="source catalog content: error resolving canonical reference: error creating image source: pinging container registry registry.redhat.io: Get \"https://registry.redhat.io/v2/\": dial tcp: lookup registry.redhat.io on 172.30.0.10:53: read udp 10.128.0.37:45886->172.30.0.10:53: read: connection refused" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="a2003d8a-14f3-407c-ae18-44dbddbdd840" 2026-03-13T10:36:48.046349045Z I0313 10:36:48.046125 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="a374f4a2-a70c-464f-a434-5cbbeed2d7b4" 2026-03-13T10:36:48.046349045Z I0313 10:36:48.046176 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="a374f4a2-a70c-464f-a434-5cbbeed2d7b4" 2026-03-13T10:36:48.046349045Z I0313 10:36:48.046235 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="a374f4a2-a70c-464f-a434-5cbbeed2d7b4" 2026-03-13T10:37:22.137366759Z I0313 10:37:22.137255 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="a374f4a2-a70c-464f-a434-5cbbeed2d7b4" 2026-03-13T10:37:22.137366759Z E0313 10:37:22.137333 1 controller.go:316] "Reconciler error" err=< 2026-03-13T10:37:22.137366759Z source catalog content: error resolving canonical reference: error creating image source: pinging container registry registry.redhat.io: Get "https://registry.redhat.io/v2/": dial tcp: lookup registry.redhat.io on 172.30.0.10:53: read udp 10.128.0.37:49740->172.30.0.10:53: read: connection refused 2026-03-13T10:37:22.137366759Z error updating status: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T10:37:22.137366759Z > controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="a374f4a2-a70c-464f-a434-5cbbeed2d7b4" 2026-03-13T10:37:22.137432091Z I0313 10:37:22.137377 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="f675e45e-8766-4786-ba1c-5ebfc1b0eb18" 2026-03-13T10:37:22.137432091Z I0313 10:37:22.137413 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="f675e45e-8766-4786-ba1c-5ebfc1b0eb18" 2026-03-13T10:37:22.137509454Z I0313 10:37:22.137467 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="f675e45e-8766-4786-ba1c-5ebfc1b0eb18" 2026-03-13T10:37:33.449285244Z E0313 10:37:33.449093 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-13T10:37:56.152869992Z I0313 10:37:56.152809 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="f675e45e-8766-4786-ba1c-5ebfc1b0eb18" 2026-03-13T10:37:56.152913763Z E0313 10:37:56.152870 1 controller.go:316] "Reconciler error" err=< 2026-03-13T10:37:56.152913763Z source catalog content: error resolving canonical reference: error creating image source: pinging container registry registry.redhat.io: Get "https://registry.redhat.io/v2/": dial tcp: lookup registry.redhat.io on 172.30.0.10:53: read udp 10.128.0.37:49573->172.30.0.10:53: read: connection refused 2026-03-13T10:37:56.152913763Z error updating status: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T10:37:56.152913763Z > controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="f675e45e-8766-4786-ba1c-5ebfc1b0eb18" 2026-03-13T10:37:56.152923694Z I0313 10:37:56.152910 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="46548b3e-e16e-4c2a-92fb-451ab88ea9d1" 2026-03-13T10:37:56.152964195Z I0313 10:37:56.152944 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="46548b3e-e16e-4c2a-92fb-451ab88ea9d1" 2026-03-13T10:37:56.153019346Z I0313 10:37:56.152994 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="46548b3e-e16e-4c2a-92fb-451ab88ea9d1" 2026-03-13T10:38:30.172452212Z I0313 10:38:30.172340 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="46548b3e-e16e-4c2a-92fb-451ab88ea9d1" 2026-03-13T10:38:30.172452212Z E0313 10:38:30.172425 1 controller.go:316] "Reconciler error" err=< 2026-03-13T10:38:30.172452212Z source catalog content: error resolving canonical reference: error creating image source: pinging container registry registry.redhat.io: Get "https://registry.redhat.io/v2/": dial tcp: lookup registry.redhat.io on 172.30.0.10:53: read udp 10.128.0.37:38349->172.30.0.10:53: read: connection refused 2026-03-13T10:38:30.172452212Z error updating status: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T10:38:30.172452212Z > controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="46548b3e-e16e-4c2a-92fb-451ab88ea9d1" 2026-03-13T10:38:30.172614817Z I0313 10:38:30.172532 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="07dd27f2-9e7e-4bf2-9fdc-7a68c7ff5bbc" 2026-03-13T10:38:30.172614817Z I0313 10:38:30.172572 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="07dd27f2-9e7e-4bf2-9fdc-7a68c7ff5bbc" 2026-03-13T10:38:30.172688699Z I0313 10:38:30.172639 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="07dd27f2-9e7e-4bf2-9fdc-7a68c7ff5bbc" 2026-03-13T10:38:33.452684613Z E0313 10:38:33.452556 1 leaderelection.go:436] error retrieving resource lock openshift-catalogd/catalogd-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io catalogd-operator-lock) 2026-03-13T10:38:46.855292034Z I0313 10:38:46.855125 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition 2026-03-13T10:38:46.855388357Z E0313 10:38:46.855339 1 main.go:351] "problem running manager" err="leader election lost" logger="setup" config/pod/openshift-catalogd/catalogd-controller-manager-7f8b8b6f4c-f46qd.json0000640000000000000000000002537515154764724025742 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-7f8b8b6f4c-f46qd","generateName":"catalogd-controller-manager-7f8b8b6f4c-","namespace":"openshift-catalogd","uid":"257a4a8b-014c-4473-80a0-e95cf6d41bf1","resourceVersion":"8794","creationTimestamp":"2026-03-13T10:36:24Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"7f8b8b6f4c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.37/23\"],\"mac_address\":\"0a:58:0a:80:00:25\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.37/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.37\"\n ],\n \"mac\": \"0a:58:0a:80:00:25\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-7f8b8b6f4c","uid":"078f1e46-3684-494b-a2c9-e9994eec0b47","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-hzv5v","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-hzv5v","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-hzv5v","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:34Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:24Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:39:02Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:39:02Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:24Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.37","podIPs":[{"ip":"10.128.0.37"}],"startTime":"2026-03-13T10:36:24Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-13T10:36:32Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://9c3f29c1b19afddcef9987888e0226a340347a13991d9e5e12422447c0c483b6","started":true,"volumeMounts":[{"name":"kube-api-access-hzv5v","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-13T10:38:50Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"request did not complete within requested timeout - context deadline exceeded\n \u003e controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"46548b3e-e16e-4c2a-92fb-451ab88ea9d1\"\nI0313 10:38:30.172532 1 clustercatalog_controller.go:86] \"reconcile starting\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"07dd27f2-9e7e-4bf2-9fdc-7a68c7ff5bbc\"\nI0313 10:38:30.172572 1 clustercatalog_controller.go:208] \"unpack required: no cached catalog metadata found for this catalog\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"07dd27f2-9e7e-4bf2-9fdc-7a68c7ff5bbc\"\nI0313 10:38:30.172639 1 main.go:250] \"using available authentication information for pulling image\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"07dd27f2-9e7e-4bf2-9fdc-7a68c7ff5bbc\"\nE0313 10:38:33.452556 1 leaderelection.go:436] error retrieving resource lock openshift-catalogd/catalogd-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io catalogd-operator-lock)\nI0313 10:38:46.855125 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE0313 10:38:46.855339 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-13T10:36:33Z","finishedAt":"2026-03-13T10:38:46Z","containerID":"cri-o://5f05908e71448e64ca18d1219369017d904e020901e65c57a4853144db037d28"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","containerID":"cri-o://505693401e0336c91ab91119b9f53889693ae2d79a1c0a657057ebc4d2c80fa9","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-hzv5v","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000001021515154764724043136 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-5c74bfc494-dpslh2026-03-13T10:38:43.917818946Z I0313 10:38:43.917639 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T10:38:43.917818946Z I0313 10:38:43.917789 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T10:38:43.919245239Z I0313 10:38:43.919207 1 observer_polling.go:159] Starting file observer 2026-03-13T10:38:43.955217541Z I0313 10:38:43.954689 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202602132343.p2.gc7b5163.assembly.stream.el9-c7b5163-c7b51633b67e3e2860ca053930422f69e17bd40a 2026-03-13T10:38:44.471230665Z I0313 10:38:44.471152 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T10:38:44.471230665Z W0313 10:38:44.471193 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:38:44.471230665Z W0313 10:38:44.471199 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:38:44.471230665Z W0313 10:38:44.471204 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T10:38:44.471230665Z W0313 10:38:44.471207 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T10:38:44.471230665Z W0313 10:38:44.471211 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T10:38:44.471230665Z W0313 10:38:44.471217 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T10:38:44.475549596Z I0313 10:38:44.475481 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T10:38:44.475719851Z I0313 10:38:44.475705 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T10:38:44.475767233Z I0313 10:38:44.475755 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T10:38:44.475879116Z I0313 10:38:44.475860 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:38:44.475909917Z I0313 10:38:44.475899 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:38:44.475969939Z I0313 10:38:44.475916 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T10:38:44.475996920Z I0313 10:38:44.475949 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T10:38:44.476025710Z I0313 10:38:44.476015 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:38:44.476303089Z I0313 10:38:44.476267 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T10:38:44.576568172Z I0313 10:38:44.576474 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:38:44.576568172Z I0313 10:38:44.576528 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T10:38:44.576721867Z I0313 10:38:44.576690 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:38:44.602730427Z I0313 10:38:44.602676 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T10:38:44.603174830Z I0313 10:38:44.603155 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... kube-scheduler-operator-container_previous.log0000640000000000000000000004135615154764724043342 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-5c74bfc494-dpslh2026-03-13T10:36:43.920421847Z I0313 10:36:43.920290 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"448d1b52-9e02-4bd7-9460-9363b5001479", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing 2026-03-13T10:36:44.340792853Z I0313 10:36:44.340502 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Pending phase 2026-03-13T10:36:45.331276799Z I0313 10:36:45.331159 1 request.go:700] Waited for 1.014405411s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller 2026-03-13T10:36:46.380661405Z I0313 10:36:46.380237 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Pending phase 2026-03-13T10:36:46.731717221Z I0313 10:36:46.731607 1 request.go:700] Waited for 1.17179748s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/configmaps/kube-scheduler-pod 2026-03-13T10:37:11.852663836Z I0313 10:37:11.852513 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="3f7270e04343ff0c603f8e1c0635e061ea7f7bd18491752738d0c9581f9d10ff") 2026-03-13T10:37:11.852663836Z W0313 10:37:11.852647 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-13T10:37:11.852837551Z I0313 10:37:11.852799 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="0aaf58c2842788e8c8374db6d905427a7807ce0ef100908bfe0288a6627a7b9b") 2026-03-13T10:37:11.853192722Z I0313 10:37:11.852931 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-13T10:37:11.853192722Z I0313 10:37:11.852967 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-13T10:37:11.853192722Z I0313 10:37:11.853031 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-13T10:37:11.853192722Z I0313 10:37:11.853059 1 base_controller.go:181] Shutting down cluster-kube-scheduler-operator-UnsupportedConfigOverrides ... 2026-03-13T10:37:11.853192722Z I0313 10:37:11.853069 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-13T10:37:11.853192722Z I0313 10:37:11.853098 1 base_controller.go:181] Shutting down kube-scheduler-Node ... 2026-03-13T10:37:11.853192722Z I0313 10:37:11.853153 1 base_controller.go:181] Shutting down StatusSyncer_kube-scheduler ... 2026-03-13T10:37:11.853192722Z I0313 10:37:11.853148 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-13T10:37:11.853192722Z I0313 10:37:11.853165 1 base_controller.go:159] All StatusSyncer_kube-scheduler post start hooks have been terminated 2026-03-13T10:37:11.853212292Z I0313 10:37:11.853196 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-13T10:37:11.853212292Z I0313 10:37:11.853194 1 base_controller.go:181] Shutting down Installer ... 2026-03-13T10:37:11.853239543Z I0313 10:37:11.853201 1 base_controller.go:181] Shutting down kube-scheduler-StaticPodState ... 2026-03-13T10:37:11.853239543Z I0313 10:37:11.853209 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-13T10:37:11.853248593Z I0313 10:37:11.853211 1 base_controller.go:181] Shutting down kube-controller-manager-RemoveStaleConditions ... 2026-03-13T10:37:11.853271274Z I0313 10:37:11.853256 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-13T10:37:11.853281714Z I0313 10:37:11.853275 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-13T10:37:11.853365077Z I0313 10:37:11.853292 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-13T10:37:11.853365077Z I0313 10:37:11.853318 1 base_controller.go:123] Shutting down worker of cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller ... 2026-03-13T10:37:11.853365077Z I0313 10:37:11.853355 1 base_controller.go:123] Shutting down worker of kube-controller-manager-RemoveStaleConditions controller ... 2026-03-13T10:37:11.853375527Z I0313 10:37:11.853365 1 base_controller.go:113] All cluster-kube-scheduler-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-13T10:37:11.853382398Z I0313 10:37:11.853370 1 base_controller.go:113] All kube-controller-manager-RemoveStaleConditions workers have been terminated 2026-03-13T10:37:11.853391288Z I0313 10:37:11.853383 1 controller_manager.go:54] cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller terminated 2026-03-13T10:37:11.853418989Z I0313 10:37:11.853402 1 base_controller.go:181] Shutting down kube-scheduler ... 2026-03-13T10:37:11.853437339Z I0313 10:37:11.853425 1 base_controller.go:181] Shutting down PruneController ... 2026-03-13T10:37:11.853449800Z I0313 10:37:11.853432 1 base_controller.go:181] Shutting down GuardController ... 2026-03-13T10:37:11.853500911Z I0313 10:37:11.853432 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-13T10:37:11.853500911Z I0313 10:37:11.853471 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-13T10:37:11.853528522Z I0313 10:37:11.853510 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-13T10:37:11.853546723Z I0313 10:37:11.853534 1 controller_manager.go:54] GuardController controller terminated 2026-03-13T10:37:11.853546723Z I0313 10:37:11.853453 1 base_controller.go:181] Shutting down kube-scheduler-InstallerState ... 2026-03-13T10:37:11.853565043Z I0313 10:37:11.853331 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853340 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-scheduler controller ... 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853626 1 base_controller.go:113] All StatusSyncer_kube-scheduler workers have been terminated 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853633 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-13T10:37:11.853833561Z E0313 10:37:11.853570 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": context canceled" 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853649 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853664 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853683 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853701 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853715 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853728 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853741 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853332 1 base_controller.go:123] Shutting down worker of kube-scheduler-Node controller ... 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853756 1 base_controller.go:113] All kube-scheduler-Node workers have been terminated 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853754 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853763 1 controller_manager.go:54] kube-scheduler-Node controller terminated 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853743 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853769 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853770 1 controller_manager.go:54] RevisionController controller terminated 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853779 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853730 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853784 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-13T10:37:11.853833561Z I0313 10:37:11.853805 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-4218193700/tls.crt::/tmp/serving-cert-4218193700/tls.key" 2026-03-13T10:37:11.854009297Z I0313 10:37:11.853819 1 builder.go:335] server exited 2026-03-13T10:37:11.854009297Z I0313 10:37:11.853740 1 base_controller.go:123] Shutting down worker of kube-scheduler controller ... 2026-03-13T10:37:11.854009297Z I0313 10:37:11.853861 1 base_controller.go:113] All kube-scheduler workers have been terminated 2026-03-13T10:37:11.854009297Z I0313 10:37:11.853893 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-13T10:37:11.854009297Z I0313 10:37:11.853900 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-13T10:37:11.854009297Z I0313 10:37:11.853909 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-13T10:37:11.854032057Z E0313 10:37:11.854002 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-03-13T10:37:11.854048358Z I0313 10:37:11.854026 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-13T10:37:11.854064688Z I0313 10:37:11.854045 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-13T10:37:11.854064688Z I0313 10:37:11.854058 1 controller_manager.go:54] PruneController controller terminated 2026-03-13T10:37:11.854210833Z E0313 10:37:11.854135 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock: client rate limiter Wait returned an error: context canceled 2026-03-13T10:37:11.854210833Z I0313 10:37:11.854175 1 leaderelection.go:297] failed to renew lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock: timed out waiting for the condition 2026-03-13T10:37:11.854749839Z I0313 10:37:11.854687 1 base_controller.go:123] Shutting down worker of kube-scheduler-InstallerState controller ... 2026-03-13T10:37:11.854749839Z I0313 10:37:11.854722 1 base_controller.go:113] All kube-scheduler-InstallerState workers have been terminated 2026-03-13T10:37:11.854749839Z I0313 10:37:11.854736 1 controller_manager.go:54] kube-scheduler-InstallerState controller terminated 2026-03-13T10:37:11.854945435Z E0313 10:37:11.854879 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T10:37:11.855654656Z E0313 10:37:11.855501 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-13T10:37:11.855977306Z W0313 10:37:11.855917 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-13T10:37:11.855977306Z W0313 10:37:11.855960 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-13T10:37:11.855992097Z W0313 10:37:11.855978 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-13T10:37:11.856202933Z E0313 10:37:11.856150 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-13T10:37:11.856252565Z E0313 10:37:11.856209 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-13T10:37:11.856252565Z I0313 10:37:11.855940 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-13T10:37:11.856265395Z I0313 10:37:11.856257 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-13T10:37:11.856287626Z I0313 10:37:11.856270 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-13T10:37:11.856741310Z I0313 10:37:11.856690 1 base_controller.go:123] Shutting down worker of kube-scheduler-StaticPodState controller ... 2026-03-13T10:37:11.856757520Z I0313 10:37:11.856749 1 base_controller.go:113] All kube-scheduler-StaticPodState workers have been terminated 2026-03-13T10:37:11.856775661Z I0313 10:37:11.856763 1 controller_manager.go:54] kube-scheduler-StaticPodState controller terminated 2026-03-13T10:37:11.858066020Z I0313 10:37:11.857910 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-13T10:37:11.858066020Z I0313 10:37:11.857987 1 base_controller.go:113] All Installer workers have been terminated 2026-03-13T10:37:11.858066020Z I0313 10:37:11.858003 1 controller_manager.go:54] Installer controller terminated 2026-03-13T10:37:11.858066020Z I0313 10:37:11.858032 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-13T10:37:11.858066020Z I0313 10:37:11.858044 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-13T10:37:11.858540164Z E0313 10:37:11.858459 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/localhost-recovery-client\": context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T10:37:11.859816403Z I0313 10:37:11.859747 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-13T10:37:11.859879205Z I0313 10:37:11.859811 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-13T10:37:16.852815855Z I0313 10:37:16.852684 1 observer_polling.go:162] Shutting down file observer 2026-03-13T10:37:45.858848444Z E0313 10:37:45.858672 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T10:37:45.858848444Z W0313 10:37:45.858763 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-dpslh.json0000640000000000000000000001365715154764724032201 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-5c74bfc494-dpslh","generateName":"openshift-kube-scheduler-operator-5c74bfc494-","namespace":"openshift-kube-scheduler-operator","uid":"8f9db15a-8854-485b-9863-9cbe5dddd977","resourceVersion":"7396","creationTimestamp":"2026-03-13T10:33:25Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"5c74bfc494"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.14/23\"],\"mac_address\":\"0a:58:0a:80:00:0e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.14/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.14\"\n ],\n \"mac\": \"0a:58:0a:80:00:0e\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-5c74bfc494","uid":"038c1d39-72f4-49db-bc03-d7b0a576be41","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:46Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.14","podIPs":[{"ip":"10.128.0.14"}],"startTime":"2026-03-13T10:35:36Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-03-13T10:38:43Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T10:35:50Z","finishedAt":"2026-03-13T10:37:45Z","containerID":"cri-o://30ed7322c0091d1c760c898b8eeff7c2a46e380aac09f0741b2738a7131c9763"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","containerID":"cri-o://3d7f37aa994251928291249049a2be620c22f26b28c64911444e794ad1a679e5","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-4-master-0/installer_current.log0000640000000000000000000001275415154764724027210 0ustar00000000000000002026-03-13T10:36:46.244146760Z I0313 10:36:46.243839 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc0007ea460 cert-secrets:0xc000701ea0 configmaps:0xc000701a40 namespace:0xc000701860 optional-configmaps:0xc000701b80 optional-secrets:0xc000701ae0 pod:0xc000701900 pod-manifest-dir:0xc000701cc0 resource-dir:0xc000701c20 revision:0xc0007017c0 secrets:0xc0007019a0 v:0xc0007eae60] [0xc0007eae60 0xc0007017c0 0xc000701860 0xc000701900 0xc000701c20 0xc000701cc0 0xc000701a40 0xc000701b80 0xc000701ae0 0xc0007019a0 0xc0007ea460 0xc000701ea0] [] map[cert-configmaps:0xc0007ea280 cert-dir:0xc0007ea460 cert-secrets:0xc000701ea0 configmaps:0xc000701a40 help:0xc0007eb220 kubeconfig:0xc000701720 log-flush-frequency:0xc0007eadc0 namespace:0xc000701860 optional-cert-configmaps:0xc0007ea3c0 optional-cert-secrets:0xc0007ea320 optional-configmaps:0xc000701b80 optional-secrets:0xc000701ae0 pod:0xc000701900 pod-manifest-dir:0xc000701cc0 pod-manifests-lock-file:0xc000701e00 resource-dir:0xc000701c20 revision:0xc0007017c0 secrets:0xc0007019a0 timeout-duration:0xc000701d60 v:0xc0007eae60 vmodule:0xc0007eaf00] [0xc000701720 0xc0007017c0 0xc000701860 0xc000701900 0xc0007019a0 0xc000701a40 0xc000701ae0 0xc000701b80 0xc000701c20 0xc000701cc0 0xc000701d60 0xc000701e00 0xc000701ea0 0xc0007ea280 0xc0007ea320 0xc0007ea3c0 0xc0007ea460 0xc0007eadc0 0xc0007eae60 0xc0007eaf00 0xc0007eb220] [0xc0007ea280 0xc0007ea460 0xc000701ea0 0xc000701a40 0xc0007eb220 0xc000701720 0xc0007eadc0 0xc000701860 0xc0007ea3c0 0xc0007ea320 0xc000701b80 0xc000701ae0 0xc000701900 0xc000701cc0 0xc000701e00 0xc000701c20 0xc0007017c0 0xc0007019a0 0xc000701d60 0xc0007eae60 0xc0007eaf00] map[104:0xc0007eb220 118:0xc0007eae60] [] -1 0 0xc0005f58c0 true 0x223d9a0 []} 2026-03-13T10:36:46.244146760Z I0313 10:36:46.244119 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000092d00)({ 2026-03-13T10:36:46.244146760Z KubeConfig: (string) "", 2026-03-13T10:36:46.244146760Z KubeClient: (kubernetes.Interface) , 2026-03-13T10:36:46.244146760Z Revision: (string) (len=1) "4", 2026-03-13T10:36:46.244146760Z NodeName: (string) "", 2026-03-13T10:36:46.244146760Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-03-13T10:36:46.244146760Z Clock: (clock.RealClock) { 2026-03-13T10:36:46.244146760Z }, 2026-03-13T10:36:46.244146760Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-03-13T10:36:46.244146760Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T10:36:46.244146760Z (string) (len=31) "localhost-recovery-client-token" 2026-03-13T10:36:46.244146760Z }, 2026-03-13T10:36:46.244146760Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T10:36:46.244146760Z (string) (len=12) "serving-cert" 2026-03-13T10:36:46.244146760Z }, 2026-03-13T10:36:46.244146760Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-03-13T10:36:46.244146760Z (string) (len=18) "kube-scheduler-pod", 2026-03-13T10:36:46.244146760Z (string) (len=6) "config", 2026-03-13T10:36:46.244146760Z (string) (len=17) "serviceaccount-ca", 2026-03-13T10:36:46.244146760Z (string) (len=20) "scheduler-kubeconfig", 2026-03-13T10:36:46.244146760Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-03-13T10:36:46.244146760Z }, 2026-03-13T10:36:46.244146760Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T10:36:46.244146760Z (string) (len=16) "policy-configmap" 2026-03-13T10:36:46.244146760Z }, 2026-03-13T10:36:46.244146760Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-03-13T10:36:46.244146760Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-03-13T10:36:46.244146760Z }, 2026-03-13T10:36:46.244146760Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-13T10:36:46.244146760Z CertConfigMapNamePrefixes: ([]string) , 2026-03-13T10:36:46.244146760Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-03-13T10:36:46.244146760Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-03-13T10:36:46.244146760Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-13T10:36:46.244146760Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-13T10:36:46.244146760Z Timeout: (time.Duration) 2m0s, 2026-03-13T10:36:46.244146760Z StaticPodManifestsLockFile: (string) "", 2026-03-13T10:36:46.244146760Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-13T10:36:46.244146760Z KubeletVersion: (string) "" 2026-03-13T10:36:46.244146760Z }) 2026-03-13T10:36:46.245329152Z I0313 10:36:46.245292 1 cmd.go:413] Getting controller reference for node master-0 2026-03-13T10:36:46.380126201Z I0313 10:36:46.379519 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-13T10:36:46.380126201Z I0313 10:36:46.379617 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T10:36:46.380126201Z I0313 10:36:46.379630 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T10:36:46.620805317Z I0313 10:36:46.620146 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-13T10:37:16.620426611Z I0313 10:37:16.620265 1 cmd.go:524] Getting installer pods for node master-0 2026-03-13T10:37:30.624742346Z F0313 10:37:30.624581 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-scheduler/installer-4-master-0.json0000640000000000000000000001643015154764724022670 0ustar0000000000000000{"metadata":{"name":"installer-4-master-0","namespace":"openshift-kube-scheduler","uid":"9e06733a-9c47-4bcf-a5e2-946db8e2714b","resourceVersion":"7383","creationTimestamp":"2026-03-13T10:36:43Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.45/23\"],\"mac_address\":\"0a:58:0a:80:00:2d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.45/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.45\"\n ],\n \"mac\": \"0a:58:0a:80:00:2d\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-4","uid":"bea375c9-a809-431b-b878-6239b4a32b15"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=4","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:43Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:42Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:42Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:43Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.45","podIPs":[{"ip":"10.128.0.45"}],"startTime":"2026-03-13T10:36:43Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"s: ([]string) (len=1 cap=1) {\n (string) (len=31) \"localhost-recovery-client-token\"\n },\n OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=12) \"serving-cert\"\n },\n ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\n (string) (len=18) \"kube-scheduler-pod\",\n (string) (len=6) \"config\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=20) \"scheduler-kubeconfig\",\n (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=16) \"policy-configmap\"\n },\n CertSecretNames: ([]string) (len=1 cap=1) {\n (string) (len=30) \"kube-scheduler-client-cert-key\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0313 10:36:46.245292 1 cmd.go:413] Getting controller reference for node master-0\nI0313 10:36:46.379519 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0313 10:36:46.379617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0313 10:36:46.379630 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0313 10:36:46.620146 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0313 10:37:16.620265 1 cmd.go:524] Getting installer pods for node master-0\nF0313 10:37:30.624581 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-13T10:36:45Z","finishedAt":"2026-03-13T10:37:30Z","containerID":"cri-o://c87d032f992ab15941d07ccbd459ecd39c5fd54e6df8b197a56c0bc747f7d534"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","containerID":"cri-o://c87d032f992ab15941d07ccbd459ecd39c5fd54e6df8b197a56c0bc747f7d534","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000004462615154764724030250 0ustar00000000000000002026-03-13T10:38:04.523645060Z weight: 0 2026-03-13T10:38:04.523645060Z - name: VolumeZone 2026-03-13T10:38:04.523645060Z weight: 0 2026-03-13T10:38:04.523645060Z - name: PodTopologySpread 2026-03-13T10:38:04.523645060Z weight: 2 2026-03-13T10:38:04.523645060Z - name: InterPodAffinity 2026-03-13T10:38:04.523645060Z weight: 2 2026-03-13T10:38:04.523645060Z - name: DefaultPreemption 2026-03-13T10:38:04.523645060Z weight: 0 2026-03-13T10:38:04.523645060Z - name: NodeResourcesBalancedAllocation 2026-03-13T10:38:04.523645060Z weight: 1 2026-03-13T10:38:04.523645060Z - name: ImageLocality 2026-03-13T10:38:04.523645060Z weight: 1 2026-03-13T10:38:04.523645060Z - name: DefaultBinder 2026-03-13T10:38:04.523645060Z weight: 0 2026-03-13T10:38:04.523645060Z permit: {} 2026-03-13T10:38:04.523645060Z postBind: {} 2026-03-13T10:38:04.523645060Z postFilter: {} 2026-03-13T10:38:04.523645060Z preBind: {} 2026-03-13T10:38:04.523645060Z preEnqueue: {} 2026-03-13T10:38:04.523645060Z preFilter: {} 2026-03-13T10:38:04.523645060Z preScore: {} 2026-03-13T10:38:04.523645060Z queueSort: {} 2026-03-13T10:38:04.523645060Z reserve: {} 2026-03-13T10:38:04.523645060Z score: {} 2026-03-13T10:38:04.523645060Z schedulerName: default-scheduler 2026-03-13T10:38:04.523645060Z > 2026-03-13T10:38:04.526114105Z I0313 10:38:04.526020 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-03-13T10:38:04.526114105Z I0313 10:38:04.526074 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-03-13T10:38:04.529173368Z I0313 10:38:04.529086 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:38:04.529173368Z I0313 10:38:04.529158 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:38:04.529400735Z I0313 10:38:04.529371 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2026-03-13T10:38:04.529606411Z I0313 10:38:04.529379 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773398224\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773398224\" (2026-03-13 09:37:04 +0000 UTC to 2027-03-13 09:37:04 +0000 UTC (now=2026-03-13 10:38:04.529357083 +0000 UTC))" 2026-03-13T10:38:04.530129067Z I0313 10:38:04.530048 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773398224\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773398224\" (2026-03-13 09:37:04 +0000 UTC to 2029-03-13 09:37:04 +0000 UTC (now=2026-03-13 10:38:04.530014593 +0000 UTC))" 2026-03-13T10:38:04.530187549Z I0313 10:38:04.530152 1 secure_serving.go:213] Serving securely on [::]:10259 2026-03-13T10:38:04.530603481Z I0313 10:38:04.530550 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T10:38:04.532466938Z I0313 10:38:04.532348 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-13T10:38:04.533267672Z I0313 10:38:04.533201 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-03-13T10:38:04.534386396Z I0313 10:38:04.534343 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-03-13T10:38:04.534511130Z I0313 10:38:04.534341 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-03-13T10:38:04.534726356Z I0313 10:38:04.534681 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-03-13T10:38:04.534888781Z I0313 10:38:04.534839 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-03-13T10:38:04.535027986Z I0313 10:38:04.534990 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-03-13T10:38:04.535102318Z I0313 10:38:04.535077 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-03-13T10:38:04.535102318Z I0313 10:38:04.534993 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-03-13T10:38:04.535356506Z I0313 10:38:04.535314 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-03-13T10:38:04.535441018Z I0313 10:38:04.535403 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-03-13T10:38:04.535602833Z I0313 10:38:04.535532 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-13T10:38:04.535902572Z I0313 10:38:04.535856 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-03-13T10:38:04.545526074Z I0313 10:38:04.545427 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-03-13T10:38:04.546152853Z I0313 10:38:04.546100 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-03-13T10:38:04.551164325Z I0313 10:38:04.551069 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-03-13T10:38:04.553061143Z I0313 10:38:04.553018 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-03-13T10:38:04.630293278Z I0313 10:38:04.630182 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:38:04.630470623Z I0313 10:38:04.630442 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-03-13T10:38:04.630850054Z I0313 10:38:04.630762 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 10:17:45 +0000 UTC to 2036-03-10 10:17:45 +0000 UTC (now=2026-03-13 10:38:04.630728911 +0000 UTC))" 2026-03-13T10:38:04.630850054Z I0313 10:38:04.630826 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2026-03-14 10:24:19 +0000 UTC (now=2026-03-13 10:38:04.630821084 +0000 UTC))" 2026-03-13T10:38:04.630870475Z I0313 10:38:04.630846 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2027-03-13 10:24:19 +0000 UTC (now=2026-03-13 10:38:04.630841514 +0000 UTC))" 2026-03-13T10:38:04.630878285Z I0313 10:38:04.630864 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2027-03-13 10:24:19 +0000 UTC (now=2026-03-13 10:38:04.630859755 +0000 UTC))" 2026-03-13T10:38:04.630910306Z I0313 10:38:04.630879 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 10:24:16 +0000 UTC to 2036-03-10 10:24:16 +0000 UTC (now=2026-03-13 10:38:04.630874325 +0000 UTC))" 2026-03-13T10:38:04.631137333Z I0313 10:38:04.631062 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773398224\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773398224\" (2026-03-13 09:37:04 +0000 UTC to 2027-03-13 09:37:04 +0000 UTC (now=2026-03-13 10:38:04.631053461 +0000 UTC))" 2026-03-13T10:38:04.631269207Z I0313 10:38:04.631210 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773398224\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773398224\" (2026-03-13 09:37:04 +0000 UTC to 2029-03-13 09:37:04 +0000 UTC (now=2026-03-13 10:38:04.631199185 +0000 UTC))" 2026-03-13T10:38:09.756727360Z E0313 10:38:09.756347 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded (Client.Timeout exceeded while awaiting headers) 2026-03-13T10:38:18.095333457Z E0313 10:38:18.095238 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T10:38:26.165171079Z E0313 10:38:26.165034 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T10:38:33.187548565Z E0313 10:38:33.187445 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T10:38:59.508787895Z I0313 10:38:59.508676 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-03-13T10:38:59.510397134Z I0313 10:38:59.509792 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-79f8cd6fdd-b4x54" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:38:59.514549530Z I0313 10:38:59.514237 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-bgvrc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:38:59.519769428Z I0313 10:38:59.517578 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-mrztj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:38:59.521567753Z I0313 10:38:59.521034 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-vr4ts" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:38:59.543042815Z I0313 10:38:59.540678 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-vkqtt" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:38:59.889762540Z I0313 10:38:59.889469 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-7c67b67d47-jbx9v" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:39:00.130603280Z I0313 10:39:00.130467 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-8c9c967c7-xmpst" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:39:00.130752125Z I0313 10:39:00.130672 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-jdzpd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:39:16.044318489Z I0313 10:39:16.044222 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-6686554ddc-hszft" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:39:21.225640215Z I0313 10:39:21.224779 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-955fcfb87-bkp8q" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:39:26.793936498Z I0313 10:39:26.790400 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-55d85b7b47-t8ll8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:39:28.458722178Z I0313 10:39:28.456896 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-664cb58b85-mq7rm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:39:28.618367941Z I0313 10:39:28.618272 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-5cdb4c5598-gsr52" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:39:28.740765119Z I0313 10:39:28.739847 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-69576476f7-pzjxd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:39:28.765159324Z I0313 10:39:28.765076 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-8f89dfddd-nhsd9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:39:28.916024355Z I0313 10:39:28.914941 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-6fbfc8dc8f-fdt9m" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:39:29.095933135Z I0313 10:39:29.094034 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945-r8ck7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:39:29.189611793Z I0313 10:39:29.187652 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-fdb5c78b5-s4fhs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:39:29.441107526Z I0313 10:39:29.440683 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-7b564dfc5b-qc9cq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:39:29.683235381Z I0313 10:39:29.681717 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-84bf6db4f9-7h8nz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:39:33.249314498Z I0313 10:39:33.249198 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-daemon-gdfnq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:40:01.507135159Z I0313 10:40:01.506908 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-controller-ff46b7bdf-jtj5g" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:40:01.699670842Z I0313 10:40:01.697201 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-754bdc9f9d-jcn8f" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:40:02.531373054Z I0313 10:40:02.531313 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-source-7c67b67d47-jbx9v" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:40:02.536262834Z I0313 10:40:02.536144 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress/router-default-79f8cd6fdd-b4x54" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:40:02.536750777Z I0313 10:40:02.536553 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-vkqtt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:40:05.962854241Z I0313 10:40:05.962740 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-server-mhk8z" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:40:07.646204932Z I0313 10:40:07.646024 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-5ff8674d55-nqnlp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:40:07.809743148Z I0313 10:40:07.805759 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496-t4g2x" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:40:20.647899285Z I0313 10:40:20.640370 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/openshift-state-metrics-74cc79fd76-jxrlm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:40:20.711168499Z I0313 10:40:20.711086 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/node-exporter-mtcsw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:40:20.721933499Z I0313 10:40:20.718120 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/kube-state-metrics-68b88f8cb5-2n8dn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:40:26.271114591Z I0313 10:40:26.270248 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/metrics-server-68597ccc5b-xrb8c" node="master-0" evaluatedNodes=1 feasibleNodes=1 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006716415154764724030444 0ustar00000000000000002026-03-13T10:32:59.893471185Z I0313 10:32:59.893384 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-03-13T10:32:59.893777164Z I0313 10:32:59.893731 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 10:17:45 +0000 UTC to 2036-03-10 10:17:45 +0000 UTC (now=2026-03-13 10:32:59.893712182 +0000 UTC))" 2026-03-13T10:32:59.893810505Z I0313 10:32:59.893769 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2026-03-14 10:24:19 +0000 UTC (now=2026-03-13 10:32:59.893764153 +0000 UTC))" 2026-03-13T10:32:59.893810505Z I0313 10:32:59.893799 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2027-03-13 10:24:19 +0000 UTC (now=2026-03-13 10:32:59.893781194 +0000 UTC))" 2026-03-13T10:32:59.893820955Z I0313 10:32:59.893812 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2027-03-13 10:24:19 +0000 UTC (now=2026-03-13 10:32:59.893807184 +0000 UTC))" 2026-03-13T10:32:59.893890567Z I0313 10:32:59.893825 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 10:24:16 +0000 UTC to 2036-03-10 10:24:16 +0000 UTC (now=2026-03-13 10:32:59.893820415 +0000 UTC))" 2026-03-13T10:32:59.893995980Z I0313 10:32:59.893965 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773397977\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773397977\" (2026-03-13 09:32:57 +0000 UTC to 2027-03-13 09:32:57 +0000 UTC (now=2026-03-13 10:32:59.893957749 +0000 UTC))" 2026-03-13T10:32:59.894253287Z I0313 10:32:59.894073 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773397978\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773397978\" (2026-03-13 09:32:57 +0000 UTC to 2029-03-13 09:32:57 +0000 UTC (now=2026-03-13 10:32:59.894061822 +0000 UTC))" 2026-03-13T10:32:59.901541310Z I0313 10:32:59.901475 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-03-13T10:32:59.901940591Z I0313 10:32:59.901918 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-s68gq" 2026-03-13T10:33:00.902664995Z I0313 10:33:00.902268 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-s68gq" 2026-03-13T10:33:02.902886247Z I0313 10:33:02.902808 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-s68gq" 2026-03-13T10:33:06.905157772Z I0313 10:33:06.904999 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-s68gq" 2026-03-13T10:33:14.912845970Z I0313 10:33:14.912689 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-s68gq" 2026-03-13T10:33:23.074738971Z I0313 10:33:23.074578 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-13T10:33:23.416907949Z I0313 10:33:23.416814 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-66c7586884-9fptc" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:23.921679054Z I0313 10:33:23.920875 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-sdg4w" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:23.939143291Z I0313 10:33:23.939038 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-olm-operator/cluster-olm-operator-77899cf6d-kh9h2" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:24.288646833Z I0313 10:33:24.288544 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-config-operator/openshift-config-operator-64488f9d78-mvfgh" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:25.021077751Z I0313 10:33:25.020977 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-authentication-operator/authentication-operator-7c6989d6c4-cwlxw" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:25.030026261Z I0313 10:33:25.029930 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-dns-operator/dns-operator-589895fbb7-wjrpm" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:25.047485748Z I0313 10:33:25.046487 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-etcd-operator/etcd-operator-5884b9cd56-df8wr" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:25.059880154Z I0313 10:33:25.059780 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5685fbc7d-mfvmx" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:25.077705111Z I0313 10:33:25.077633 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-86d7cdfdfb-px9bl" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:25.095717594Z I0313 10:33:25.095571 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress-operator/ingress-operator-677db989d6-tzd9b" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:25.112654756Z I0313 10:33:25.110465 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8565d84698-nsg74" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:25.126674927Z I0313 10:33:25.125942 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-dpslh" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:25.126674927Z I0313 10:33:25.126101 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-745944c6b7-s6k7z" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:33:25.138060525Z I0313 10:33:25.136770 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/cluster-monitoring-operator-674cbfbd9d-vk9qz" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:25.179395048Z I0313 10:33:25.178940 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-2j5jl" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:25.188805311Z I0313 10:33:25.188737 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-image-registry/cluster-image-registry-operator-86d6d77c7c-492v4" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:25.189228923Z I0313 10:33:25.189205 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/network-operator-7c649bf6d4-6vpl4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:33:25.204724715Z I0313 10:33:25.204632 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-d5b45" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:25.213215722Z I0313 10:33:25.213122 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-vqdk8" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:25.223316864Z I0313 10:33:25.223241 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rsl2h" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:25.231079221Z I0313 10:33:25.231007 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-7f65c457f5-j7lxv" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:25.242765687Z I0313 10:33:25.242687 1 schedule_one.go:314] "Successfully bound pod to node" pod="assisted-installer/assisted-installer-controller-s68gq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:33:25.269710819Z I0313 10:33:25.269582 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-marketplace/marketplace-operator-64bf9778cb-85x6d" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:33:25.370220733Z I0313 10:33:25.370083 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-service-ca-operator/service-ca-operator-69b6fc6b88-lntzv" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:34:19.860191981Z I0313 10:34:19.860099 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/mtu-prober-dmzf7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:34:29.482466372Z I0313 10:34:29.482381 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-qng6t" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:34:29.682359899Z I0313 10:34:29.682257 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-additional-cni-plugins-mc5nc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:34:30.489195431Z I0313 10:34:30.489089 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/network-metrics-daemon-jz2lp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:34:32.470335855Z I0313 10:34:32.470247 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-multus/multus-admission-controller-8d675b596-d787l" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:34:41.889473606Z I0313 10:34:41.887000 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-66b55d57d-zwdrn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:34:42.105170301Z I0313 10:34:42.105077 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-t6fzx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:34:50.011114153Z I0313 10:34:50.011020 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-7c67b67d47-jbx9v" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T10:34:51.220295614Z I0313 10:34:51.218789 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-96vwf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:34:52.318816316Z I0313 10:34:52.318716 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-9z8mk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:18.498428474Z I0313 10:35:18.498321 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-hztqp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.603855949Z I0313 10:35:36.603764 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-sdg4w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.605303908Z I0313 10:35:36.604228 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-7c6989d6c4-cwlxw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.605303908Z I0313 10:35:36.604234 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-77899cf6d-kh9h2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.605303908Z I0313 10:35:36.604355 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-64488f9d78-mvfgh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.605303908Z I0313 10:35:36.604374 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-d5b45" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.605303908Z I0313 10:35:36.604402 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-66c7586884-9fptc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.612398689Z I0313 10:35:36.609297 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8565d84698-nsg74" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.612398689Z I0313 10:35:36.609420 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-86d6d77c7c-492v4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.612398689Z I0313 10:35:36.609619 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-589895fbb7-wjrpm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.614789023Z I0313 10:35:36.614729 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-2j5jl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.625516541Z I0313 10:35:36.614874 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-vqdk8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.625516541Z I0313 10:35:36.614907 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-dpslh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.625516541Z I0313 10:35:36.615014 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5685fbc7d-mfvmx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.625516541Z I0313 10:35:36.615077 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-5884b9cd56-df8wr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.625516541Z I0313 10:35:36.621473 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-674cbfbd9d-vk9qz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.625516541Z I0313 10:35:36.622688 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-64bf9778cb-85x6d" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.626366373Z I0313 10:35:36.626329 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-677db989d6-tzd9b" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.626433895Z I0313 10:35:36.626412 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-gdjjd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.626460376Z I0313 10:35:36.626399 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rsl2h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.626483507Z I0313 10:35:36.626456 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-69b6fc6b88-lntzv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.626509727Z I0313 10:35:36.626459 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-8d675b596-d787l" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.626509727Z I0313 10:35:36.626498 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-7f65c457f5-j7lxv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:36.626644521Z I0313 10:35:36.626616 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-86d7cdfdfb-px9bl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:56.062608542Z I0313 10:35:56.062289 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-fc5589ff-d48hw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:56.165745760Z I0313 10:35:56.165644 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-67f68cdb6-lbnl6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:35:56.987556892Z I0313 10:35:56.987475 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-7c5b48d77b-g5f7k" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T10:35:58.817355176Z I0313 10:35:58.817288 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-7c5b48d77b-g5f7k" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:36:04.520255566Z I0313 10:36:04.520193 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-57ccdf9b5-fgvbv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:36:09.149976914Z I0313 10:36:09.148801 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-7577d6f48-cbhxt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:36:12.250187036Z I0313 10:36:12.249280 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-84bfdbbb7f-l8h7l" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:36:23.249731972Z I0313 10:36:23.249638 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-778fb45b4-65f7b" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:36:23.630893241Z I0313 10:36:23.630824 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-6467bdd544-n9745" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:36:24.140578169Z I0313 10:36:24.140508 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-7f8b8b6f4c-f46qd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:36:24.972902565Z I0313 10:36:24.972770 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-6598bfb6c4-bg6zf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:36:27.669729430Z I0313 10:36:27.663800 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-65bc99cdf7-7rjbr" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T10:36:29.127669443Z I0313 10:36:29.127391 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-65bc99cdf7-7rjbr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:36:32.118523814Z I0313 10:36:32.118380 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-7wkqw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:36:32.562162788Z I0313 10:36:32.561532 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-6954c8766d-g8z48" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T10:36:32.655181309Z I0313 10:36:32.655017 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-657b8bf46d-r5dxm" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T10:36:32.766752131Z I0313 10:36:32.766335 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-zc596" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:36:33.081413474Z I0313 10:36:33.079164 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-tfwn8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:36:34.072412634Z I0313 10:36:34.072341 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-6954c8766d-g8z48" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T10:36:34.072731783Z I0313 10:36:34.072705 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-657b8bf46d-r5dxm" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T10:36:36.089412909Z I0313 10:36:36.088752 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-657b8bf46d-r5dxm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:36:36.089412909Z I0313 10:36:36.089246 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6954c8766d-g8z48" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T10:36:53.381248859Z E0313 10:36:53.380546 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded (Client.Timeout exceeded while awaiting headers), falling back to slow path 2026-03-13T10:36:58.380969676Z E0313 10:36:58.380832 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-03-13T10:36:58.380969676Z I0313 10:36:58.380886 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2026-03-13T10:37:03.382165622Z E0313 10:37:03.381912 1 leaderelection.go:322] Failed to release lock: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T10:37:03.382165622Z E0313 10:37:03.381990 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515154764724023023 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"46c22bb5-2b6e-4123-8cf1-b715c28e4ca2","resourceVersion":"7293","creationTimestamp":"2026-03-13T10:34:05Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"a1a56802af72ce1aac6b5077f1695ac0","kubernetes.io/config.mirror":"a1a56802af72ce1aac6b5077f1695ac0","kubernetes.io/config.seen":"2026-03-13T10:32:41.926835675Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"cb006092-fd40-4d71-84fb-f3ba8c313f97","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:45Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:45Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:37:04Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:37:04Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:45Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T10:35:45Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-03-13T10:37:04Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-03-13T10:32:57Z","finishedAt":"2026-03-13T10:37:03Z","containerID":"cri-o://3bbb19054cdef32aad8515587717178e7bce7c315eb6bc762119d4e27dd7a9b0"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","containerID":"cri-o://e29c9e8859ea50a213d1056d538b6a3cc96cdadb35b68c7127f1a2cbb6be6418","started":true}],"qosClass":"Burstable"}}cluster-policy-controller_current.log0000640000000000000000000007052515154764724034240 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-13T10:34:01.074382161Z E0313 10:34:01.074282 1 leaderelection.go:429] Failed to update lock optimitically: Operation cannot be fulfilled on leases.coordination.k8s.io "cluster-policy-controller-lock": StorageError: invalid object, Code: 4, Key: /kubernetes.io/leases/kube-system/cluster-policy-controller-lock, ResourceVersion: 0, AdditionalErrorMsg: Precondition failed: UID in precondition: 25751b1f-a846-400a-b5f5-a5c2db42fa4f, UID in object meta: , falling back to slow path 2026-03-13T10:34:26.727704261Z I0313 10:34:26.726654 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-multus namespace 2026-03-13T10:34:27.645890780Z I0313 10:34:27.645781 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-03-13T10:34:27.699180983Z W0313 10:34:27.699058 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T10:34:27.699180983Z E0313 10:34:27.699118 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T10:34:27.849677625Z I0313 10:34:27.849570 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-03-13T10:34:33.459642476Z I0313 10:34:33.459530 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ovn-kubernetes namespace 2026-03-13T10:34:39.215787040Z I0313 10:34:39.215696 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [k8s.cni.cncf.io/v1, Resource=network-attachment-definitions k8s.cni.cncf.io/v1alpha1, Resource=ipamclaims k8s.ovn.org/v1, Resource=egressfirewalls k8s.ovn.org/v1, Resource=egressqoses k8s.ovn.org/v1, Resource=egressservices k8s.ovn.org/v1, Resource=userdefinednetworks whereabouts.cni.cncf.io/v1alpha1, Resource=ippools whereabouts.cni.cncf.io/v1alpha1, Resource=nodeslicepools whereabouts.cni.cncf.io/v1alpha1, Resource=overlappingrangeipreservations], removed: [] 2026-03-13T10:34:39.215829941Z I0313 10:34:39.215801 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="network-attachment-definitions.k8s.cni.cncf.io" 2026-03-13T10:34:39.215829941Z I0313 10:34:39.215826 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressservices.k8s.ovn.org" 2026-03-13T10:34:39.215865702Z I0313 10:34:39.215845 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ippools.whereabouts.cni.cncf.io" 2026-03-13T10:34:39.215876182Z I0313 10:34:39.215866 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="nodeslicepools.whereabouts.cni.cncf.io" 2026-03-13T10:34:39.215887122Z I0313 10:34:39.215880 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ipamclaims.k8s.cni.cncf.io" 2026-03-13T10:34:39.215950634Z I0313 10:34:39.215911 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressfirewalls.k8s.ovn.org" 2026-03-13T10:34:39.215950634Z I0313 10:34:39.215943 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressqoses.k8s.ovn.org" 2026-03-13T10:34:39.215995775Z I0313 10:34:39.215967 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="userdefinednetworks.k8s.ovn.org" 2026-03-13T10:34:39.215995775Z I0313 10:34:39.215991 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="overlappingrangeipreservations.whereabouts.cni.cncf.io" 2026-03-13T10:34:39.229716801Z I0313 10:34:39.229615 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T10:34:39.241390185Z I0313 10:34:39.241267 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T10:34:39.254211298Z I0313 10:34:39.254157 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T10:34:39.267123403Z I0313 10:34:39.267000 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T10:34:39.281054594Z I0313 10:34:39.280985 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T10:34:39.293366135Z I0313 10:34:39.293290 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T10:34:39.303293155Z I0313 10:34:39.303213 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T10:34:39.327919425Z I0313 10:34:39.327839 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T10:34:39.337651931Z I0313 10:34:39.337604 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T10:34:39.417250066Z I0313 10:34:39.417167 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-13T10:34:41.461795809Z I0313 10:34:41.461713 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-host-network namespace 2026-03-13T10:34:43.161320327Z I0313 10:34:43.161227 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-diagnostics namespace 2026-03-13T10:34:52.001342717Z I0313 10:34:52.001260 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "network-node-identity" not found 2026-03-13T10:34:52.001631564Z I0313 10:34:52.001573 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-node-identity namespace 2026-03-13T10:34:52.067376631Z I0313 10:34:52.067274 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "network-node-identity-leases" not found 2026-03-13T10:35:21.267678718Z W0313 10:35:21.266823 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T10:35:21.267678718Z E0313 10:35:21.266876 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T10:35:53.470455610Z I0313 10:35:53.470346 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-controller-manager namespace 2026-03-13T10:35:54.107736371Z I0313 10:35:54.103848 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-route-controller-manager namespace 2026-03-13T10:35:57.646327921Z W0313 10:35:57.646251 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T10:35:57.646327921Z E0313 10:35:57.646303 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T10:35:59.120121271Z I0313 10:35:59.120028 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-oauth-apiserver namespace 2026-03-13T10:36:01.912642680Z I0313 10:36:01.912488 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-authentication namespace 2026-03-13T10:36:03.486274116Z I0313 10:36:03.486193 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-kube-storage-version-migrator namespace 2026-03-13T10:36:09.440653030Z I0313 10:36:09.440061 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [snapshot.storage.k8s.io/v1, Resource=volumesnapshots], removed: [] 2026-03-13T10:36:09.440653030Z I0313 10:36:09.440217 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="volumesnapshots.snapshot.storage.k8s.io" 2026-03-13T10:36:09.466388575Z I0313 10:36:09.466292 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T10:36:09.541182983Z I0313 10:36:09.541080 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-13T10:36:09.711228663Z I0313 10:36:09.711136 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:openshift:useroauthaccesstoken-manager" not found 2026-03-13T10:36:10.325922136Z I0313 10:36:10.325826 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-apiserver namespace 2026-03-13T10:36:10.540691443Z I0313 10:36:10.540519 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-service-ca namespace 2026-03-13T10:36:13.434090243Z I0313 10:36:13.434008 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-catalogd namespace 2026-03-13T10:36:13.456958530Z I0313 10:36:13.456866 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-operator-controller namespace 2026-03-13T10:36:18.481808033Z I0313 10:36:18.481734 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T10:36:32.406788985Z I0313 10:36:32.406657 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-dns namespace 2026-03-13T10:36:41.835728516Z I0313 10:36:41.835666 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-03-13T10:36:46.877623858Z I0313 10:36:46.874965 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-03-13T10:36:56.198904426Z W0313 10:36:56.198776 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T10:36:56.198904426Z E0313 10:36:56.198834 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T10:37:09.555819294Z I0313 10:37:09.555747 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T10:37:09.555935778Z E0313 10:37:09.555921 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T10:37:31.971397285Z W0313 10:37:31.971317 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T10:37:31.971397285Z E0313 10:37:31.971381 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T10:37:35.855577857Z E0313 10:37:35.855481 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-13T10:37:39.565521461Z I0313 10:37:39.565424 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T10:37:39.565521461Z E0313 10:37:39.565492 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T10:38:09.762821445Z I0313 10:38:09.762133 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T10:38:09.762821445Z E0313 10:38:09.762220 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T10:38:18.429137810Z W0313 10:38:18.429046 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T10:38:18.429137810Z E0313 10:38:18.429099 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T10:38:35.857701588Z E0313 10:38:35.857661 1 leaderelection.go:436] error retrieving resource lock kube-system/cluster-policy-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-policy-controller-lock) 2026-03-13T10:38:39.771884645Z I0313 10:38:39.771780 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T10:38:39.771884645Z E0313 10:38:39.771843 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T10:38:49.210391263Z I0313 10:38:49.210262 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:openshift:controller:resourcequota-controller" not found 2026-03-13T10:38:49.215979943Z I0313 10:38:49.215942 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:openshift:controller:horizontal-pod-autoscaler" not found 2026-03-13T10:38:50.383532475Z I0313 10:38:50.383416 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift namespace 2026-03-13T10:38:50.407144812Z I0313 10:38:50.407076 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-node namespace 2026-03-13T10:38:50.529730903Z I0313 10:38:50.529677 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-8ltvm" has been approved 2026-03-13T10:38:50.556546867Z I0313 10:38:50.556473 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-hsrs8" has been approved 2026-03-13T10:38:54.495054032Z I0313 10:38:54.494961 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ingress namespace 2026-03-13T10:38:58.590262964Z W0313 10:38:58.590159 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T10:38:58.590262964Z E0313 10:38:58.590229 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T10:39:09.784805328Z I0313 10:39:09.784688 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T10:39:09.784805328Z E0313 10:39:09.784781 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T10:39:22.271597515Z I0313 10:39:22.271516 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "openshift-marketplace-metrics" not found 2026-03-13T10:39:24.592761308Z I0313 10:39:24.592672 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-cluster-autoscaler-operator" not found 2026-03-13T10:39:25.540122839Z I0313 10:39:25.538475 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-03-13T10:39:26.871877780Z I0313 10:39:26.864822 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-03-13T10:39:29.383978045Z I0313 10:39:29.383240 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-machine-api-operator" not found 2026-03-13T10:39:39.801107359Z I0313 10:39:39.801012 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T10:39:39.801107359Z E0313 10:39:39.801072 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T10:39:44.089347130Z W0313 10:39:44.089257 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T10:39:44.089347130Z E0313 10:39:44.089325 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T10:40:09.810853756Z I0313 10:40:09.810732 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T10:40:09.810853756Z E0313 10:40:09.810800 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T10:40:16.837886409Z W0313 10:40:16.837813 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T10:40:16.837886409Z E0313 10:40:16.837860 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T10:40:39.829160193Z I0313 10:40:39.829047 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T10:40:39.829160193Z E0313 10:40:39.829125 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T10:40:53.802024864Z W0313 10:40:53.801925 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T10:40:53.802024864Z E0313 10:40:53.801987 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T10:41:09.837786614Z I0313 10:41:09.837686 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: metrics.k8s.io/v1beta1: stale GroupVersion discovery: metrics.k8s.io/v1beta1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T10:41:09.837786614Z E0313 10:41:09.837746 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: metrics.k8s.io/v1beta1: stale GroupVersion discovery: metrics.k8s.io/v1beta1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" kube-controller-manager_current.log0000640000000000000000000006316615154764724033623 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-13T10:40:01.695165233Z I0313 10:40:01.695100 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-754bdc9f9d" duration="19.382253ms" 2026-03-13T10:40:01.705815705Z I0313 10:40:01.705625 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-754bdc9f9d" duration="10.470657ms" 2026-03-13T10:40:01.706037881Z I0313 10:40:01.705841 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-754bdc9f9d" duration="163.834µs" 2026-03-13T10:40:01.723730709Z I0313 10:40:01.722444 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-754bdc9f9d" duration="83.192µs" 2026-03-13T10:40:02.242888203Z I0313 10:40:02.242264 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="104.983µs" 2026-03-13T10:40:02.530101911Z I0313 10:40:02.530008 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="69.162µs" 2026-03-13T10:40:02.538767840Z I0313 10:40:02.538314 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-79f8cd6fdd" duration="53.022µs" 2026-03-13T10:40:02.538767840Z I0313 10:40:02.538549 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="32.971µs" 2026-03-13T10:40:02.555254366Z I0313 10:40:02.552393 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="60.271µs" 2026-03-13T10:40:02.555254366Z I0313 10:40:02.552513 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="42.031µs" 2026-03-13T10:40:02.574244939Z I0313 10:40:02.574165 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="65.002µs" 2026-03-13T10:40:02.583307048Z I0313 10:40:02.582517 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="66.462µs" 2026-03-13T10:40:02.602786374Z I0313 10:40:02.602696 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-79f8cd6fdd" duration="70.202µs" 2026-03-13T10:40:02.664547017Z I0313 10:40:02.663572 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-754bdc9f9d" duration="9.544092ms" 2026-03-13T10:40:02.664547017Z I0313 10:40:02.664401 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-754bdc9f9d" duration="77.672µs" 2026-03-13T10:40:02.673306649Z I0313 10:40:02.673238 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="8.099374ms" 2026-03-13T10:40:02.673372951Z I0313 10:40:02.673352 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="71.062µs" 2026-03-13T10:40:03.261380276Z I0313 10:40:03.261285 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="55.661µs" 2026-03-13T10:40:03.345196174Z I0313 10:40:03.343179 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="74.822µs" 2026-03-13T10:40:03.694712619Z I0313 10:40:03.694636 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="12.13055ms" 2026-03-13T10:40:03.694867313Z I0313 10:40:03.694823 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="90.472µs" 2026-03-13T10:40:05.675979402Z I0313 10:40:05.674882 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="68.052µs" 2026-03-13T10:40:06.875702429Z I0313 10:40:06.871858 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-79f8cd6fdd" duration="58.471µs" 2026-03-13T10:40:06.893164141Z I0313 10:40:06.893102 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="7.686103ms" 2026-03-13T10:40:06.893323786Z I0313 10:40:06.893309 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="82.582µs" 2026-03-13T10:40:07.285603852Z I0313 10:40:07.285499 1 replica_set.go:624] "Too many replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" need=0 deleting=1 2026-03-13T10:40:07.285603852Z I0313 10:40:07.285541 1 replica_set.go:251] "Found related ReplicaSets" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" relatedReplicaSets=["openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945"] 2026-03-13T10:40:07.285663684Z I0313 10:40:07.285577 1 controller_utils.go:608] "Deleting pod" logger="replicaset-controller" controller="cluster-cloud-controller-manager-operator-559568b945" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945-r8ck7" 2026-03-13T10:40:07.309208697Z I0313 10:40:07.309133 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="23.664816ms" 2026-03-13T10:40:07.309773831Z I0313 10:40:07.309737 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T10:40:07.322736454Z I0313 10:40:07.322675 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="13.494377ms" 2026-03-13T10:40:07.322783366Z I0313 10:40:07.322761 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="42.251µs" 2026-03-13T10:40:07.478354811Z I0313 10:40:07.478271 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="61.682µs" 2026-03-13T10:40:07.612741396Z I0313 10:40:07.609985 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/prometheus-operator-5ff8674d55" need=1 creating=1 2026-03-13T10:40:07.631647536Z I0313 10:40:07.628886 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/prometheus-operator" err="Operation cannot be fulfilled on deployments.apps \"prometheus-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T10:40:07.647466695Z I0313 10:40:07.647386 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="37.45538ms" 2026-03-13T10:40:07.661120376Z I0313 10:40:07.659525 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/prometheus-operator" err="Operation cannot be fulfilled on deployments.apps \"prometheus-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T10:40:07.666790246Z I0313 10:40:07.666699 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="19.260429ms" 2026-03-13T10:40:07.666897539Z I0313 10:40:07.666859 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="100.303µs" 2026-03-13T10:40:07.667036183Z I0313 10:40:07.666984 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="57.192µs" 2026-03-13T10:40:07.679873512Z I0313 10:40:07.674326 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/prometheus-operator" err="Operation cannot be fulfilled on deployments.apps \"prometheus-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T10:40:07.679873512Z I0313 10:40:07.674828 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="57.001µs" 2026-03-13T10:40:07.727367949Z I0313 10:40:07.726830 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="53.221µs" 2026-03-13T10:40:07.737842336Z I0313 10:40:07.737750 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="71.152µs" 2026-03-13T10:40:07.784358796Z I0313 10:40:07.784210 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" need=1 creating=1 2026-03-13T10:40:07.803679397Z I0313 10:40:07.803476 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T10:40:07.815990093Z I0313 10:40:07.814147 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="30.000884ms" 2026-03-13T10:40:07.836513106Z I0313 10:40:07.836385 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="22.174167ms" 2026-03-13T10:40:07.836673870Z I0313 10:40:07.836642 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="122.853µs" 2026-03-13T10:40:07.837459791Z I0313 10:40:07.837172 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="48.401µs" 2026-03-13T10:40:08.391898738Z I0313 10:40:08.391794 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="91.742µs" 2026-03-13T10:40:09.798803447Z I0313 10:40:09.798697 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="34.429421ms" 2026-03-13T10:40:09.798872509Z I0313 10:40:09.798843 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="90.672µs" 2026-03-13T10:40:10.886896331Z I0313 10:40:10.885140 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="51.634955ms" 2026-03-13T10:40:10.886896331Z I0313 10:40:10.885268 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="80.172µs" 2026-03-13T10:40:20.601470635Z I0313 10:40:20.598271 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/openshift-state-metrics-74cc79fd76" need=1 creating=1 2026-03-13T10:40:20.645859380Z I0313 10:40:20.645785 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-74cc79fd76" duration="47.553741ms" 2026-03-13T10:40:20.653426714Z I0313 10:40:20.653348 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/openshift-state-metrics" err="Operation cannot be fulfilled on deployments.apps \"openshift-state-metrics\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T10:40:20.654136703Z I0313 10:40:20.654082 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/kube-state-metrics-68b88f8cb5" need=1 creating=1 2026-03-13T10:40:20.664436640Z I0313 10:40:20.664364 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-74cc79fd76" duration="18.524099ms" 2026-03-13T10:40:20.665140819Z I0313 10:40:20.665117 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-74cc79fd76" duration="253.597µs" 2026-03-13T10:40:20.665847128Z I0313 10:40:20.665826 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-74cc79fd76" duration="77.282µs" 2026-03-13T10:40:20.682162628Z I0313 10:40:20.681921 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-68b88f8cb5" duration="28.087166ms" 2026-03-13T10:40:20.686145825Z I0313 10:40:20.682856 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/kube-state-metrics" err="Operation cannot be fulfilled on deployments.apps \"kube-state-metrics\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T10:40:20.686260058Z I0313 10:40:20.683313 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/openshift-state-metrics" err="Operation cannot be fulfilled on deployments.apps \"openshift-state-metrics\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T10:40:20.724620601Z I0313 10:40:20.724529 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/openshift-state-metrics" err="Operation cannot be fulfilled on deployments.apps \"openshift-state-metrics\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T10:40:20.724620601Z I0313 10:40:20.724546 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/kube-state-metrics" err="Operation cannot be fulfilled on deployments.apps \"kube-state-metrics\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T10:40:20.741310810Z I0313 10:40:20.741233 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-68b88f8cb5" duration="58.945157ms" 2026-03-13T10:40:20.741360642Z I0313 10:40:20.741327 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-68b88f8cb5" duration="50.602µs" 2026-03-13T10:40:20.776274762Z I0313 10:40:20.776188 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-68b88f8cb5" duration="93.343µs" 2026-03-13T10:40:21.367264133Z I0313 10:40:21.364478 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-74cc79fd76" duration="83.192µs" 2026-03-13T10:40:21.511677102Z I0313 10:40:21.510787 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-68b88f8cb5" duration="89.722µs" 2026-03-13T10:40:24.894871749Z I0313 10:40:24.894692 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-74cc79fd76" duration="10.619125ms" 2026-03-13T10:40:24.895923327Z I0313 10:40:24.895880 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-74cc79fd76" duration="39.751µs" 2026-03-13T10:40:24.910831868Z I0313 10:40:24.910744 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-68b88f8cb5" duration="9.601538ms" 2026-03-13T10:40:24.911182748Z I0313 10:40:24.911125 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-68b88f8cb5" duration="90.033µs" 2026-03-13T10:40:26.253094416Z I0313 10:40:26.252989 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/metrics-server-68597ccc5b" need=1 creating=1 2026-03-13T10:40:26.267228607Z I0313 10:40:26.267076 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/metrics-server" err="Operation cannot be fulfilled on deployments.apps \"metrics-server\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T10:40:26.277210395Z I0313 10:40:26.274978 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-68597ccc5b" duration="22.051944ms" 2026-03-13T10:40:26.286911896Z I0313 10:40:26.286801 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/metrics-server" err="Operation cannot be fulfilled on deployments.apps \"metrics-server\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T10:40:26.286945377Z I0313 10:40:26.286904 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-68597ccc5b" duration="11.87148ms" 2026-03-13T10:40:26.307232754Z I0313 10:40:26.307158 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-68597ccc5b" duration="20.203104ms" 2026-03-13T10:40:26.307281505Z I0313 10:40:26.307273 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-68597ccc5b" duration="80.262µs" 2026-03-13T10:40:26.988096355Z I0313 10:40:26.988021 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-68597ccc5b" duration="86.722µs" 2026-03-13T10:40:27.732958449Z E0313 10:40:27.732859 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" logger="UnhandledError" 2026-03-13T10:40:27.830198907Z I0313 10:40:27.830078 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2026-03-13T10:40:28.905181059Z I0313 10:40:28.904802 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-68597ccc5b" duration="93.003µs" 2026-03-13T10:40:52.069188320Z I0313 10:40:52.069104 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress-operator/ingress-operator-677db989d6" duration="8.650772ms" 2026-03-13T10:40:52.069657783Z I0313 10:40:52.069577 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress-operator/ingress-operator-677db989d6" duration="89.102µs" 2026-03-13T10:40:53.085858563Z I0313 10:40:53.085753 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress-operator/ingress-operator-677db989d6" duration="12.114887ms" 2026-03-13T10:40:53.085936775Z I0313 10:40:53.085908 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress-operator/ingress-operator-677db989d6" duration="96.212µs" 2026-03-13T10:40:57.741556100Z E0313 10:40:57.741432 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" logger="UnhandledError" 2026-03-13T10:40:57.843332460Z I0313 10:40:57.843261 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2026-03-13T10:41:00.143104689Z I0313 10:41:00.143028 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-8f89dfddd" duration="12.466675ms" 2026-03-13T10:41:00.144644260Z I0313 10:41:00.144364 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-8f89dfddd" duration="58.371µs" 2026-03-13T10:41:01.161743403Z I0313 10:41:01.160807 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-8f89dfddd" duration="21.071638ms" 2026-03-13T10:41:01.161743403Z I0313 10:41:01.160975 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-8f89dfddd" duration="105.903µs" 2026-03-13T10:41:06.625535839Z I0313 10:41:06.625459 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-68597ccc5b" duration="102.163µs" 2026-03-13T10:41:06.656743109Z I0313 10:41:06.656681 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-68597ccc5b" duration="9.695581ms" 2026-03-13T10:41:06.656840792Z I0313 10:41:06.656816 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-68597ccc5b" duration="85.842µs" kube-controller-manager_previous.log0000640000000000000000000003142215154764724034003 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-13T10:37:02.392978061Z I0313 10:37:02.392965 1 flags.go:64] FLAG: --pvclaimbinder-sync-period="15s" 2026-03-13T10:37:02.392978061Z I0313 10:37:02.392968 1 flags.go:64] FLAG: --requestheader-allowed-names="[]" 2026-03-13T10:37:02.392978061Z I0313 10:37:02.392972 1 flags.go:64] FLAG: --requestheader-client-ca-file="" 2026-03-13T10:37:02.392985892Z I0313 10:37:02.392975 1 flags.go:64] FLAG: --requestheader-extra-headers-prefix="[x-remote-extra-]" 2026-03-13T10:37:02.392985892Z I0313 10:37:02.392979 1 flags.go:64] FLAG: --requestheader-group-headers="[x-remote-group]" 2026-03-13T10:37:02.392993862Z I0313 10:37:02.392983 1 flags.go:64] FLAG: --requestheader-username-headers="[x-remote-user]" 2026-03-13T10:37:02.392993862Z I0313 10:37:02.392988 1 flags.go:64] FLAG: --resource-quota-sync-period="5m0s" 2026-03-13T10:37:02.393002072Z I0313 10:37:02.392990 1 flags.go:64] FLAG: --root-ca-file="/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt" 2026-03-13T10:37:02.393002072Z I0313 10:37:02.392995 1 flags.go:64] FLAG: --route-reconciliation-period="10s" 2026-03-13T10:37:02.393002072Z I0313 10:37:02.392998 1 flags.go:64] FLAG: --secondary-node-eviction-rate="0.01" 2026-03-13T10:37:02.393010232Z I0313 10:37:02.393002 1 flags.go:64] FLAG: --secure-port="10257" 2026-03-13T10:37:02.393010232Z I0313 10:37:02.393006 1 flags.go:64] FLAG: --service-account-private-key-file="/etc/kubernetes/secrets/service-account.key" 2026-03-13T10:37:02.393018003Z I0313 10:37:02.393009 1 flags.go:64] FLAG: --service-cluster-ip-range="172.30.0.0/16" 2026-03-13T10:37:02.393018003Z I0313 10:37:02.393012 1 flags.go:64] FLAG: --show-hidden-metrics-for-version="" 2026-03-13T10:37:02.393018003Z I0313 10:37:02.393015 1 flags.go:64] FLAG: --terminated-pod-gc-threshold="12500" 2026-03-13T10:37:02.393026173Z I0313 10:37:02.393018 1 flags.go:64] FLAG: --tls-cert-file="" 2026-03-13T10:37:02.393026173Z I0313 10:37:02.393021 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2026-03-13T10:37:02.393033483Z I0313 10:37:02.393026 1 flags.go:64] FLAG: --tls-min-version="" 2026-03-13T10:37:02.393033483Z I0313 10:37:02.393029 1 flags.go:64] FLAG: --tls-private-key-file="" 2026-03-13T10:37:02.393041203Z I0313 10:37:02.393031 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2026-03-13T10:37:02.393041203Z I0313 10:37:02.393036 1 flags.go:64] FLAG: --unhealthy-zone-threshold="0.55" 2026-03-13T10:37:02.393048543Z I0313 10:37:02.393040 1 flags.go:64] FLAG: --unsupported-kube-api-over-localhost="false" 2026-03-13T10:37:02.393048543Z I0313 10:37:02.393043 1 flags.go:64] FLAG: --use-service-account-credentials="true" 2026-03-13T10:37:02.393056264Z I0313 10:37:02.393046 1 flags.go:64] FLAG: --v="2" 2026-03-13T10:37:02.393056264Z I0313 10:37:02.393051 1 flags.go:64] FLAG: --version="false" 2026-03-13T10:37:02.393063574Z I0313 10:37:02.393057 1 flags.go:64] FLAG: --vmodule="" 2026-03-13T10:37:02.393215238Z W0313 10:37:02.393189 1 feature_gate.go:330] unrecognized feature gate: AWSEFSDriverVolumeMetrics 2026-03-13T10:37:02.393215238Z W0313 10:37:02.393200 1 feature_gate.go:330] unrecognized feature gate: NetworkSegmentation 2026-03-13T10:37:02.393215238Z W0313 10:37:02.393202 1 feature_gate.go:330] unrecognized feature gate: PersistentIPsForVirtualization 2026-03-13T10:37:02.393215238Z W0313 10:37:02.393205 1 feature_gate.go:330] unrecognized feature gate: AlibabaPlatform 2026-03-13T10:37:02.393215238Z W0313 10:37:02.393209 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstall 2026-03-13T10:37:02.393215238Z W0313 10:37:02.393212 1 feature_gate.go:330] unrecognized feature gate: SignatureStores 2026-03-13T10:37:02.393229308Z W0313 10:37:02.393215 1 feature_gate.go:330] unrecognized feature gate: MachineAPIProviderOpenStack 2026-03-13T10:37:02.393229308Z W0313 10:37:02.393217 1 feature_gate.go:330] unrecognized feature gate: NetworkDiagnosticsConfig 2026-03-13T10:37:02.393229308Z W0313 10:37:02.393220 1 feature_gate.go:330] unrecognized feature gate: MachineConfigNodes 2026-03-13T10:37:02.393229308Z W0313 10:37:02.393223 1 feature_gate.go:330] unrecognized feature gate: NetworkLiveMigration 2026-03-13T10:37:02.393229308Z W0313 10:37:02.393225 1 feature_gate.go:330] unrecognized feature gate: GCPClusterHostedDNS 2026-03-13T10:37:02.393238368Z W0313 10:37:02.393229 1 feature_gate.go:330] unrecognized feature gate: AzureWorkloadIdentity 2026-03-13T10:37:02.393238368Z W0313 10:37:02.393232 1 feature_gate.go:330] unrecognized feature gate: OpenShiftPodSecurityAdmission 2026-03-13T10:37:02.393238368Z W0313 10:37:02.393234 1 feature_gate.go:330] unrecognized feature gate: GatewayAPI 2026-03-13T10:37:02.393246549Z W0313 10:37:02.393237 1 feature_gate.go:330] unrecognized feature gate: CSIDriverSharedResource 2026-03-13T10:37:02.393246549Z W0313 10:37:02.393241 1 feature_gate.go:330] unrecognized feature gate: ConsolePluginContentSecurityPolicy 2026-03-13T10:37:02.393246549Z W0313 10:37:02.393243 1 feature_gate.go:330] unrecognized feature gate: PinnedImages 2026-03-13T10:37:02.393254319Z W0313 10:37:02.393246 1 feature_gate.go:330] unrecognized feature gate: SetEIPForNLBIngressController 2026-03-13T10:37:02.393254319Z W0313 10:37:02.393249 1 feature_gate.go:330] unrecognized feature gate: OVNObservability 2026-03-13T10:37:02.393261669Z W0313 10:37:02.393253 1 feature_gate.go:353] Setting GA feature gate CloudDualStackNodeIPs=true. It will be removed in a future release. 2026-03-13T10:37:02.393261669Z W0313 10:37:02.393257 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiVCenters 2026-03-13T10:37:02.393269529Z W0313 10:37:02.393260 1 feature_gate.go:330] unrecognized feature gate: DNSNameResolver 2026-03-13T10:37:02.393269529Z W0313 10:37:02.393263 1 feature_gate.go:330] unrecognized feature gate: MixedCPUsAllocation 2026-03-13T10:37:02.393269529Z W0313 10:37:02.393266 1 feature_gate.go:353] Setting GA feature gate ValidatingAdmissionPolicy=true. It will be removed in a future release. 2026-03-13T10:37:02.393277980Z W0313 10:37:02.393269 1 feature_gate.go:330] unrecognized feature gate: MinimumKubeletVersion 2026-03-13T10:37:02.393277980Z W0313 10:37:02.393273 1 feature_gate.go:330] unrecognized feature gate: ClusterMonitoringConfig 2026-03-13T10:37:02.393285700Z W0313 10:37:02.393275 1 feature_gate.go:330] unrecognized feature gate: MachineAPIOperatorDisableMachineHealthCheckController 2026-03-13T10:37:02.393285700Z W0313 10:37:02.393280 1 feature_gate.go:330] unrecognized feature gate: NewOLM 2026-03-13T10:37:02.393285700Z W0313 10:37:02.393282 1 feature_gate.go:330] unrecognized feature gate: InsightsConfigAPI 2026-03-13T10:37:02.393294050Z W0313 10:37:02.393285 1 feature_gate.go:330] unrecognized feature gate: IngressControllerLBSubnetsAWS 2026-03-13T10:37:02.393294050Z W0313 10:37:02.393289 1 feature_gate.go:330] unrecognized feature gate: OnClusterBuild 2026-03-13T10:37:02.393305090Z W0313 10:37:02.393291 1 feature_gate.go:330] unrecognized feature gate: VSphereControlPlaneMachineSet 2026-03-13T10:37:02.393305090Z W0313 10:37:02.393295 1 feature_gate.go:330] unrecognized feature gate: Example 2026-03-13T10:37:02.393305090Z W0313 10:37:02.393298 1 feature_gate.go:330] unrecognized feature gate: AutomatedEtcdBackup 2026-03-13T10:37:02.393305090Z W0313 10:37:02.393300 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiNetworks 2026-03-13T10:37:02.393314341Z W0313 10:37:02.393304 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAzure 2026-03-13T10:37:02.393314341Z W0313 10:37:02.393307 1 feature_gate.go:330] unrecognized feature gate: ImageStreamImportMode 2026-03-13T10:37:02.393314341Z W0313 10:37:02.393309 1 feature_gate.go:330] unrecognized feature gate: NodeDisruptionPolicy 2026-03-13T10:37:02.393322571Z W0313 10:37:02.393312 1 feature_gate.go:330] unrecognized feature gate: HardwareSpeed 2026-03-13T10:37:02.393322571Z W0313 10:37:02.393316 1 feature_gate.go:330] unrecognized feature gate: PlatformOperators 2026-03-13T10:37:02.393322571Z W0313 10:37:02.393318 1 feature_gate.go:330] unrecognized feature gate: AdditionalRoutingCapabilities 2026-03-13T10:37:02.393330751Z W0313 10:37:02.393321 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImagesAWS 2026-03-13T10:37:02.393330751Z W0313 10:37:02.393324 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAWS 2026-03-13T10:37:02.393330751Z W0313 10:37:02.393327 1 feature_gate.go:330] unrecognized feature gate: UpgradeStatus 2026-03-13T10:37:02.393339101Z W0313 10:37:02.393330 1 feature_gate.go:330] unrecognized feature gate: PrivateHostedZoneAWS 2026-03-13T10:37:02.393339101Z W0313 10:37:02.393333 1 feature_gate.go:330] unrecognized feature gate: EtcdBackendQuota 2026-03-13T10:37:02.393346821Z W0313 10:37:02.393336 1 feature_gate.go:330] unrecognized feature gate: InsightsOnDemandDataGather 2026-03-13T10:37:02.393346821Z W0313 10:37:02.393340 1 feature_gate.go:330] unrecognized feature gate: NutanixMultiSubnets 2026-03-13T10:37:02.393346821Z W0313 10:37:02.393343 1 feature_gate.go:330] unrecognized feature gate: VSphereStaticIPs 2026-03-13T10:37:02.393354542Z W0313 10:37:02.393346 1 feature_gate.go:330] unrecognized feature gate: VSphereDriverConfiguration 2026-03-13T10:37:02.393354542Z W0313 10:37:02.393349 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDCWithUIDAndExtraClaimMappings 2026-03-13T10:37:02.393363712Z W0313 10:37:02.393353 1 feature_gate.go:353] Setting GA feature gate DisableKubeletCloudCredentialProviders=true. It will be removed in a future release. 2026-03-13T10:37:02.393363712Z W0313 10:37:02.393357 1 feature_gate.go:330] unrecognized feature gate: AWSClusterHostedDNS 2026-03-13T10:37:02.393363712Z W0313 10:37:02.393360 1 feature_gate.go:330] unrecognized feature gate: SigstoreImageVerification 2026-03-13T10:37:02.393374162Z W0313 10:37:02.393363 1 feature_gate.go:330] unrecognized feature gate: BareMetalLoadBalancer 2026-03-13T10:37:02.393374162Z W0313 10:37:02.393367 1 feature_gate.go:330] unrecognized feature gate: InsightsRuntimeExtractor 2026-03-13T10:37:02.393374162Z W0313 10:37:02.393370 1 feature_gate.go:351] Setting deprecated feature gate KMSv1=true. It will be removed in a future release. 2026-03-13T10:37:02.393384282Z W0313 10:37:02.393373 1 feature_gate.go:330] unrecognized feature gate: BuildCSIVolumes 2026-03-13T10:37:02.393384282Z W0313 10:37:02.393376 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDC 2026-03-13T10:37:02.393384282Z W0313 10:37:02.393379 1 feature_gate.go:330] unrecognized feature gate: AdminNetworkPolicy 2026-03-13T10:37:02.393384282Z W0313 10:37:02.393381 1 feature_gate.go:330] unrecognized feature gate: ChunkSizeMiB 2026-03-13T10:37:02.393398773Z W0313 10:37:02.393384 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallGCP 2026-03-13T10:37:02.393398773Z W0313 10:37:02.393387 1 feature_gate.go:330] unrecognized feature gate: MachineAPIMigration 2026-03-13T10:37:02.393398773Z W0313 10:37:02.393390 1 feature_gate.go:330] unrecognized feature gate: GCPLabelsTags 2026-03-13T10:37:02.393398773Z W0313 10:37:02.393393 1 feature_gate.go:330] unrecognized feature gate: MetricsCollectionProfiles 2026-03-13T10:37:02.393398773Z W0313 10:37:02.393395 1 feature_gate.go:330] unrecognized feature gate: VolumeGroupSnapshot 2026-03-13T10:37:02.393407633Z W0313 10:37:02.393398 1 feature_gate.go:330] unrecognized feature gate: BootcNodeManagement 2026-03-13T10:37:02.393407633Z W0313 10:37:02.393401 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImages 2026-03-13T10:37:02.393407633Z W0313 10:37:02.393404 1 feature_gate.go:330] unrecognized feature gate: RouteAdvertisements 2026-03-13T10:37:02.393415403Z W0313 10:37:02.393406 1 feature_gate.go:330] unrecognized feature gate: IngressControllerDynamicConfigurationManager 2026-03-13T10:37:02.393415403Z W0313 10:37:02.393409 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstallIBMCloud 2026-03-13T10:37:02.393447964Z W0313 10:37:02.393431 1 feature_gate.go:330] unrecognized feature gate: InsightsConfig 2026-03-13T10:37:02.889059152Z I0313 10:37:02.888975 1 serving.go:380] Generated self-signed cert (/var/run/kubernetes/kube-controller-manager.crt, /var/run/kubernetes/kube-controller-manager.key) 2026-03-13T10:37:02.891079187Z I0313 10:37:02.891023 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/kubernetes/kube-controller-manager.crt::/var/run/kubernetes/kube-controller-manager.key" config/pod/kube-system/bootstrap-kube-controller-manager-master-0.json0000640000000000000000000002734715154764724024646 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-controller-manager-master-0","namespace":"kube-system","uid":"3fb81ab2-f471-4c79-9f86-04df865ef3ef","resourceVersion":"7421","creationTimestamp":"2026-03-13T10:34:18Z","labels":{"openshift.io/component":"controller-manager","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"f78c05e1499b533b83f091333d61f045","kubernetes.io/config.mirror":"f78c05e1499b533b83f091333d61f045","kubernetes.io/config.seen":"2026-03-13T10:32:41.926834005Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"cb006092-fd40-4d71-84fb-f3ba8c313f97","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"etc-kubernetes-cloud","hostPath":{"path":"/etc/kubernetes/cloud","type":""}},{"name":"config","hostPath":{"path":"/etc/kubernetes/bootstrap-configs","type":""}},{"name":"ssl-certs-host","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["hyperkube","kube-controller-manager"],"args":["--openshift-config=/etc/kubernetes/config/kube-controller-manager-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2","--allocate-node-cidrs=false","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--cert-dir=/var/run/kubernetes","--cloud-provider=external","--cluster-cidr=10.128.0.0/16","--cluster-signing-cert-file=/etc/kubernetes/secrets/kubelet-signer.crt","--cluster-signing-duration=720h","--cluster-signing-key-file=/etc/kubernetes/secrets/kubelet-signer.key","--controllers=*","--controllers=-bootstrapsigner","--controllers=-tokencleaner","--controllers=-ttl","--enable-dynamic-provisioning=true","--feature-gates=AWSClusterHostedDNS=false","--feature-gates=AWSEFSDriverVolumeMetrics=true","--feature-gates=AdditionalRoutingCapabilities=false","--feature-gates=AdminNetworkPolicy=true","--feature-gates=AlibabaPlatform=true","--feature-gates=AutomatedEtcdBackup=false","--feature-gates=AzureWorkloadIdentity=true","--feature-gates=BareMetalLoadBalancer=true","--feature-gates=BootcNodeManagement=false","--feature-gates=BuildCSIVolumes=true","--feature-gates=CSIDriverSharedResource=false","--feature-gates=ChunkSizeMiB=true","--feature-gates=CloudDualStackNodeIPs=true","--feature-gates=ClusterAPIInstall=false","--feature-gates=ClusterAPIInstallIBMCloud=false","--feature-gates=ClusterMonitoringConfig=false","--feature-gates=ConsolePluginContentSecurityPolicy=false","--feature-gates=DNSNameResolver=false","--feature-gates=DisableKubeletCloudCredentialProviders=true","--feature-gates=DynamicResourceAllocation=false","--feature-gates=EtcdBackendQuota=false","--feature-gates=EventedPLEG=false","--feature-gates=Example=false","--feature-gates=ExternalOIDC=false","--feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false","--feature-gates=GCPClusterHostedDNS=false","--feature-gates=GCPLabelsTags=true","--feature-gates=GatewayAPI=false","--feature-gates=HardwareSpeed=true","--feature-gates=ImageStreamImportMode=false","--feature-gates=IngressControllerDynamicConfigurationManager=false","--feature-gates=IngressControllerLBSubnetsAWS=true","--feature-gates=InsightsConfig=false","--feature-gates=InsightsConfigAPI=false","--feature-gates=InsightsOnDemandDataGather=false","--feature-gates=InsightsRuntimeExtractor=false","--feature-gates=KMSv1=true","--feature-gates=MachineAPIMigration=false","--feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false","--feature-gates=MachineAPIProviderOpenStack=false","--feature-gates=MachineConfigNodes=false","--feature-gates=ManagedBootImages=true","--feature-gates=ManagedBootImagesAWS=true","--feature-gates=MaxUnavailableStatefulSet=false","--feature-gates=MetricsCollectionProfiles=false","--feature-gates=MinimumKubeletVersion=false","--feature-gates=MixedCPUsAllocation=false","--feature-gates=MultiArchInstallAWS=true","--feature-gates=MultiArchInstallAzure=false","--feature-gates=MultiArchInstallGCP=true","--feature-gates=NetworkDiagnosticsConfig=true","--feature-gates=NetworkLiveMigration=true","--feature-gates=NetworkSegmentation=true","--feature-gates=NewOLM=true","--feature-gates=NodeDisruptionPolicy=true","--feature-gates=NodeSwap=false","--feature-gates=NutanixMultiSubnets=false","--feature-gates=OVNObservability=false","--feature-gates=OnClusterBuild=true","--feature-gates=OpenShiftPodSecurityAdmission=false","--feature-gates=PersistentIPsForVirtualization=true","--feature-gates=PinnedImages=false","--feature-gates=PlatformOperators=false","--feature-gates=PrivateHostedZoneAWS=true","--feature-gates=ProcMountType=false","--feature-gates=RouteAdvertisements=false","--feature-gates=RouteExternalCertificate=false","--feature-gates=ServiceAccountTokenNodeBinding=false","--feature-gates=SetEIPForNLBIngressController=true","--feature-gates=SignatureStores=false","--feature-gates=SigstoreImageVerification=false","--feature-gates=StreamingCollectionEncodingToJSON=true","--feature-gates=StreamingCollectionEncodingToProtobuf=true","--feature-gates=TranslateStreamCloseWebsocketRequests=false","--feature-gates=UpgradeStatus=false","--feature-gates=UserNamespacesPodSecurityStandards=false","--feature-gates=UserNamespacesSupport=false","--feature-gates=VSphereControlPlaneMachineSet=true","--feature-gates=VSphereDriverConfiguration=true","--feature-gates=VSphereMultiNetworks=false","--feature-gates=VSphereMultiVCenters=true","--feature-gates=VSphereStaticIPs=true","--feature-gates=ValidatingAdmissionPolicy=true","--feature-gates=VolumeAttributesClass=false","--feature-gates=VolumeGroupSnapshot=false","--flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec","--kube-api-burst=300","--kube-api-qps=150","--leader-elect-renew-deadline=12s","--leader-elect-resource-lock=leases","--leader-elect-retry-period=3s","--leader-elect=true","--pv-recycler-pod-template-filepath-hostpath=","--pv-recycler-pod-template-filepath-nfs=","--root-ca-file=/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt","--secure-port=10257","--service-account-private-key-file=/etc/kubernetes/secrets/service-account.key","--service-cluster-ip-range=172.30.0.0/16","--use-service-account-credentials=true"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","command":["cluster-policy-controller","start"],"args":["--config=/etc/kubernetes/config/cluster-policy-controller-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--namespace=$(POD_NAMESPACE)","--v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:45Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:45Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:47Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:47Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:45Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T10:35:45Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2026-03-13T10:33:00Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","containerID":"cri-o://e9000808717ea9c0e3216e703e0ba1564b42f55e959843c60a49ae0e4eb9a8e7","started":true},{"name":"kube-controller-manager","state":{"running":{"startedAt":"2026-03-13T10:37:53Z"}},"lastState":{"terminated":{"exitCode":2,"reason":"Error","startedAt":"2026-03-13T10:37:02Z","finishedAt":"2026-03-13T10:37:53Z","containerID":"cri-o://281e47a8ccfe9b7bd7d1fae86c8e235e63f17e9935336f3e6ad3bed18be23300"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","containerID":"cri-o://6b8cee904e554093314cde9eee6c22eacab9d7c222d3e342258752f9f92f0479","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000001020415154764724044575 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-86d7cdfdfb-px9bl2026-03-13T10:38:43.859187996Z I0313 10:38:43.859036 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T10:38:43.859187996Z I0313 10:38:43.859139 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T10:38:43.859682381Z I0313 10:38:43.859650 1 observer_polling.go:159] Starting file observer 2026-03-13T10:38:43.909021329Z I0313 10:38:43.908967 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602162248.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-13T10:38:44.386667728Z I0313 10:38:44.385878 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T10:38:44.386667728Z W0313 10:38:44.385921 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:38:44.386667728Z W0313 10:38:44.385930 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:38:44.386667728Z W0313 10:38:44.385938 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T10:38:44.386667728Z W0313 10:38:44.385942 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T10:38:44.386667728Z W0313 10:38:44.385947 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T10:38:44.386667728Z W0313 10:38:44.385951 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T10:38:44.390750332Z I0313 10:38:44.390034 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T10:38:44.390750332Z I0313 10:38:44.390126 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T10:38:44.390750332Z I0313 10:38:44.390141 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T10:38:44.390750332Z I0313 10:38:44.390217 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T10:38:44.390750332Z I0313 10:38:44.390465 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T10:38:44.390750332Z I0313 10:38:44.390619 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T10:38:44.390750332Z I0313 10:38:44.390630 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:38:44.390750332Z I0313 10:38:44.390656 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:38:44.390750332Z I0313 10:38:44.390684 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:38:44.492777419Z I0313 10:38:44.490961 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:38:44.492777419Z I0313 10:38:44.491697 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:38:44.492777419Z I0313 10:38:44.491797 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T10:38:44.602300244Z I0313 10:38:44.602234 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T10:38:44.603130719Z I0313 10:38:44.602652 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... kube-controller-manager-operator_previous.log0000640000000000000000000004763415154764724045010 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-86d7cdfdfb-px9bl2026-03-13T10:37:53.879157683Z I0313 10:37:53.879148 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-13T10:37:53.879342488Z I0313 10:37:53.879318 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-13T10:37:53.879724790Z I0313 10:37:53.879678 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:37:53.879724790Z I0313 10:37:53.879706 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T10:37:53.879814072Z I0313 10:37:53.879789 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-13T10:37:53.879814072Z I0313 10:37:53.879789 1 base_controller.go:181] Shutting down PruneController ... 2026-03-13T10:37:53.879854594Z I0313 10:37:53.879829 1 base_controller.go:181] Shutting down kube-controller-manager-operator-UnsupportedConfigOverrides ... 2026-03-13T10:37:53.879862794Z I0313 10:37:53.879850 1 base_controller.go:181] Shutting down GarbageCollectorWatcherController ... 2026-03-13T10:37:53.879862794Z I0313 10:37:53.879858 1 base_controller.go:181] Shutting down StatusSyncer_kube-controller-manager ... 2026-03-13T10:37:53.879873904Z I0313 10:37:53.879860 1 base_controller.go:181] Shutting down Installer ... 2026-03-13T10:37:53.879883185Z I0313 10:37:53.879866 1 base_controller.go:181] Shutting down kube-controller-manager-InstallerState ... 2026-03-13T10:37:53.879883185Z I0313 10:37:53.879865 1 base_controller.go:159] All StatusSyncer_kube-controller-manager post start hooks have been terminated 2026-03-13T10:37:53.879891105Z I0313 10:37:53.879882 1 base_controller.go:181] Shutting down WorkerLatencyProfile ... 2026-03-13T10:37:53.879899795Z I0313 10:37:53.879885 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-13T10:37:53.879907155Z I0313 10:37:53.879895 1 base_controller.go:181] Shutting down kube-controller-manager ... 2026-03-13T10:37:53.879915826Z I0313 10:37:53.879904 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-13T10:37:53.879915826Z I0313 10:37:53.879911 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-13T10:37:53.879994728Z I0313 10:37:53.879963 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1674477805/tls.crt::/tmp/serving-cert-1674477805/tls.key" 2026-03-13T10:37:53.879994728Z I0313 10:37:53.879971 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-13T10:37:53.880009248Z I0313 10:37:53.880003 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-13T10:37:53.880017769Z I0313 10:37:53.880008 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-13T10:37:53.880079181Z I0313 10:37:53.880019 1 base_controller.go:181] Shutting down SATokenSignerController ... 2026-03-13T10:37:53.880079181Z I0313 10:37:53.880062 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-13T10:37:53.880095181Z I0313 10:37:53.880082 1 base_controller.go:181] Shutting down kube-controller-manager-StaticPodState ... 2026-03-13T10:37:53.880128592Z I0313 10:37:53.880094 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-13T10:37:53.880137182Z I0313 10:37:53.880129 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-13T10:37:53.880234355Z I0313 10:37:53.880133 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T10:37:53.880234355Z W0313 10:37:53.880056 1 base_controller.go:242] Updating status of "RevisionController" failed: unable to ApplyStatus for operator using fieldManager "RevisionController-reportDegraded": Patch "https://172.30.0.1:443/apis/operator.openshift.io/v1/kubecontrollermanagers/cluster/status?fieldManager=RevisionController-reportDegraded&force=true": context canceled 2026-03-13T10:37:53.880234355Z I0313 10:37:53.880142 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T10:37:53.880234355Z I0313 10:37:53.880177 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-13T10:37:53.880234355Z E0313 10:37:53.880202 1 base_controller.go:279] "Unhandled Error" err="RevisionController reconciliation failed: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-03-13T10:37:53.880234355Z E0313 10:37:53.880217 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-StaticPodState\": Patch \"https://172.30.0.1:443/apis/operator.openshift.io/v1/kubecontrollermanagers/cluster/status?fieldManager=kube-controller-manager-StaticPodState&force=true\": context canceled" 2026-03-13T10:37:53.880261136Z I0313 10:37:53.880240 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-13T10:37:53.880290697Z I0313 10:37:53.880268 1 base_controller.go:123] Shutting down worker of kube-controller-manager controller ... 2026-03-13T10:37:53.880290697Z I0313 10:37:53.880284 1 base_controller.go:113] All kube-controller-manager workers have been terminated 2026-03-13T10:37:53.880301517Z I0313 10:37:53.880290 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-13T10:37:53.880301517Z I0313 10:37:53.880297 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-13T10:37:53.880312358Z I0313 10:37:53.880306 1 controller_manager.go:54] PruneController controller terminated 2026-03-13T10:37:53.880321128Z I0313 10:37:53.880314 1 base_controller.go:123] Shutting down worker of kube-controller-manager-operator-UnsupportedConfigOverrides controller ... 2026-03-13T10:37:53.880321128Z I0313 10:37:53.880318 1 base_controller.go:113] All kube-controller-manager-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-13T10:37:53.880331108Z I0313 10:37:53.880322 1 controller_manager.go:54] kube-controller-manager-operator-UnsupportedConfigOverrides controller terminated 2026-03-13T10:37:53.880331108Z I0313 10:37:53.880327 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-controller-manager controller ... 2026-03-13T10:37:53.880340268Z I0313 10:37:53.880332 1 base_controller.go:113] All StatusSyncer_kube-controller-manager workers have been terminated 2026-03-13T10:37:53.880348189Z E0313 10:37:53.880339 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-Installer\": Patch \"https://172.30.0.1:443/apis/operator.openshift.io/v1/kubecontrollermanagers/cluster/status?fieldManager=kube-controller-manager-Installer&force=true\": context canceled" 2026-03-13T10:37:53.880355359Z I0313 10:37:53.880343 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-13T10:37:53.880381190Z I0313 10:37:53.880359 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-13T10:37:53.880381190Z I0313 10:37:53.880371 1 base_controller.go:181] Shutting down kube-controller-manager-Node ... 2026-03-13T10:37:53.880391230Z I0313 10:37:53.880377 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T10:37:53.880391230Z I0313 10:37:53.880383 1 base_controller.go:181] Shutting down GuardController ... 2026-03-13T10:37:53.880400250Z I0313 10:37:53.880389 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T10:37:53.880400250Z I0313 10:37:53.880376 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-13T10:37:53.880413451Z I0313 10:37:53.880400 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-13T10:37:53.880413451Z I0313 10:37:53.880395 1 base_controller.go:123] Shutting down worker of kube-controller-manager-Node controller ... 2026-03-13T10:37:53.880413451Z I0313 10:37:53.880405 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-13T10:37:53.880423391Z I0313 10:37:53.880412 1 base_controller.go:113] All kube-controller-manager-Node workers have been terminated 2026-03-13T10:37:53.880433181Z I0313 10:37:53.880424 1 controller_manager.go:54] kube-controller-manager-Node controller terminated 2026-03-13T10:37:53.880433181Z I0313 10:37:53.880413 1 controller_manager.go:54] GuardController controller terminated 2026-03-13T10:37:53.880441752Z I0313 10:37:53.880402 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-13T10:37:53.880484123Z I0313 10:37:53.880460 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T10:37:53.880484123Z I0313 10:37:53.880469 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-13T10:37:53.880512264Z E0313 10:37:53.880489 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: Put \"https://172.30.0.1:443/apis/operator.openshift.io/v1/kubecontrollermanagers/cluster/status\": context canceled" 2026-03-13T10:37:53.880512264Z I0313 10:37:53.880484 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T10:37:53.880524674Z I0313 10:37:53.880072 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-13T10:37:53.880532514Z I0313 10:37:53.880525 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-13T10:37:53.880539725Z I0313 10:37:53.880529 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-13T10:37:53.880539725Z I0313 10:37:53.880531 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-13T10:37:53.880548805Z I0313 10:37:53.880539 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-13T10:37:53.880572456Z I0313 10:37:53.880553 1 builder.go:335] server exited 2026-03-13T10:37:53.880572456Z I0313 10:37:53.880557 1 base_controller.go:123] Shutting down worker of GarbageCollectorWatcherController controller ... 2026-03-13T10:37:53.880617527Z I0313 10:37:53.880598 1 base_controller.go:113] All GarbageCollectorWatcherController workers have been terminated 2026-03-13T10:37:53.880708210Z E0313 10:37:53.880668 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": context canceled" 2026-03-13T10:37:53.880863674Z E0313 10:37:53.880832 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-13T10:37:53.881017489Z E0313 10:37:53.880991 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa), \"manifests/installer-cluster-rolebinding.yaml\" (string): Get \"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:operator:openshift-kube-controller-manager-installer\": context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T10:37:53.882110392Z I0313 10:37:53.882068 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-13T10:37:53.882110392Z I0313 10:37:53.882085 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-13T10:37:53.882110392Z I0313 10:37:53.882091 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-13T10:37:53.882110392Z I0313 10:37:53.882103 1 base_controller.go:123] Shutting down worker of kube-controller-manager-InstallerState controller ... 2026-03-13T10:37:53.882129673Z I0313 10:37:53.882109 1 base_controller.go:113] All kube-controller-manager-InstallerState workers have been terminated 2026-03-13T10:37:53.882129673Z I0313 10:37:53.882114 1 controller_manager.go:54] kube-controller-manager-InstallerState controller terminated 2026-03-13T10:37:53.882129673Z I0313 10:37:53.882125 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-13T10:37:53.882138173Z I0313 10:37:53.882132 1 base_controller.go:113] All Installer workers have been terminated 2026-03-13T10:37:53.882145363Z I0313 10:37:53.882136 1 controller_manager.go:54] Installer controller terminated 2026-03-13T10:37:53.882152593Z I0313 10:37:53.882147 1 base_controller.go:123] Shutting down worker of kube-controller-manager-StaticPodState controller ... 2026-03-13T10:37:53.882160094Z I0313 10:37:53.882152 1 base_controller.go:113] All kube-controller-manager-StaticPodState workers have been terminated 2026-03-13T10:37:53.882160094Z I0313 10:37:53.882156 1 controller_manager.go:54] kube-controller-manager-StaticPodState controller terminated 2026-03-13T10:37:53.882184444Z I0313 10:37:53.882169 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-13T10:37:53.882184444Z I0313 10:37:53.882178 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-13T10:37:53.882201015Z I0313 10:37:53.882191 1 base_controller.go:123] Shutting down worker of SATokenSignerController controller ... 2026-03-13T10:37:53.882208655Z I0313 10:37:53.882199 1 base_controller.go:113] All SATokenSignerController workers have been terminated 2026-03-13T10:37:53.882216425Z I0313 10:37:53.882208 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-13T10:37:53.882223616Z I0313 10:37:53.882214 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-13T10:37:53.882223616Z I0313 10:37:53.882219 1 controller_manager.go:54] RevisionController controller terminated 2026-03-13T10:37:53.887691812Z E0313 10:37:53.887626 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-controller-manager/recycler-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts pv-recycler-controller), \"assets/kube-controller-manager/localhost-recovery-client-crb.yaml\" (string): Get \"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:operator:kube-controller-manager-recovery\": context canceled, \"assets/kube-controller-manager/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T10:37:53.888866067Z I0313 10:37:53.888834 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-13T10:37:53.888886628Z I0313 10:37:53.888863 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-13T10:37:57.164026426Z E0313 10:37:57.163922 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{kube-controller-manager-operator.189c604e68c3f3ab openshift-kube-controller-manager-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-kube-controller-manager-operator,Name:kube-controller-manager-operator,UID:0e4c86f3-e574-4891-8f89-ddba310bbc69,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:ConfigMapCreateFailed,Message:Failed to create ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager: Timeout: request did not complete within requested timeout - context deadline exceeded,Source:EventSource{Component:kube-controller-manager-operator-revisioncontroller,Host:,},FirstTimestamp:2026-03-13 10:37:23.158520747 +0000 UTC m=+79.617321039,LastTimestamp:2026-03-13 10:37:23.158520747 +0000 UTC m=+79.617321039,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kube-controller-manager-operator-revisioncontroller,ReportingInstance:,}" 2026-03-13T10:37:58.878876771Z I0313 10:37:58.878734 1 observer_polling.go:162] Shutting down file observer 2026-03-13T10:38:22.561839608Z E0313 10:38:22.561728 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{kube-controller-manager-operator.189c605452b00e0d openshift-kube-controller-manager-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-kube-controller-manager-operator,Name:kube-controller-manager-operator,UID:0e4c86f3-e574-4891-8f89-ddba310bbc69,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:InstallerPodFailed,Message:Failed to create installer pod for revision 1 count 0 on node \"master-0\": the server was unable to return a response in the time allotted, but may still be processing the request (get pods installer-1-master-0),Source:EventSource{Component:kube-controller-manager-operator-installer-controller,Host:,},FirstTimestamp:2026-03-13 10:37:48.557921805 +0000 UTC m=+105.016722077,LastTimestamp:2026-03-13 10:37:48.557921805 +0000 UTC m=+105.016722077,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kube-controller-manager-operator-installer-controller,ReportingInstance:,}" 2026-03-13T10:38:27.881603441Z E0313 10:38:27.881458 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T10:38:27.881603441Z W0313 10:38:27.881497 1 leaderelection.go:84] leader election lost kube-controller-manager-operator-86d7cdfdfb-px9bl.json0000640000000000000000000001451015154764724033713 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-86d7cdfdfb-px9bl","generateName":"kube-controller-manager-operator-86d7cdfdfb-","namespace":"openshift-kube-controller-manager-operator","uid":"ec3168fc-6c8f-4603-94e0-17b1ae22a802","resourceVersion":"7399","creationTimestamp":"2026-03-13T10:33:25Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"86d7cdfdfb"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.25/23\"],\"mac_address\":\"0a:58:0a:80:00:19\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.25/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.25\"\n ],\n \"mac\": \"0a:58:0a:80:00:19\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-86d7cdfdfb","uid":"d666d9ca-1aba-420b-bba7-2e6185b873cf","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:35768a0c3eb24134dd38633e8acfc7db69ee96b2fd660e9bba3b8c996452fef7"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:46Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.25","podIPs":[{"ip":"10.128.0.25"}],"startTime":"2026-03-13T10:35:36Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-03-13T10:38:43Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T10:36:03Z","finishedAt":"2026-03-13T10:38:27Z","containerID":"cri-o://1920e0c05ffebe7a0fab80b000aebd0c99a9626ca78c9c2b099c218c0c998378"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","containerID":"cri-o://294850f202234f4a9d138e028654f94bb9813203f7edf3397d10697e7a4b46a2","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-controller-manager/logs/installer-1-master-0/installer_current.log0000640000000000000000000001620715154764724031017 0ustar00000000000000002026-03-13T10:36:48.351340038Z I0313 10:36:48.350323 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc000877b80 cert-dir:0xc000877d60 cert-secrets:0xc000877ae0 configmaps:0xc000877680 namespace:0xc0008774a0 optional-cert-configmaps:0xc000877cc0 optional-configmaps:0xc0008777c0 optional-secrets:0xc000877720 pod:0xc000877540 pod-manifest-dir:0xc000877900 resource-dir:0xc000877860 revision:0xc000877400 secrets:0xc0008775e0 v:0xc0008fe820] [0xc0008fe820 0xc000877400 0xc0008774a0 0xc000877540 0xc000877860 0xc000877900 0xc000877680 0xc0008777c0 0xc0008775e0 0xc000877720 0xc000877d60 0xc000877b80 0xc000877cc0 0xc000877ae0] [] map[cert-configmaps:0xc000877b80 cert-dir:0xc000877d60 cert-secrets:0xc000877ae0 configmaps:0xc000877680 help:0xc0008febe0 kubeconfig:0xc000877360 log-flush-frequency:0xc0008fe780 namespace:0xc0008774a0 optional-cert-configmaps:0xc000877cc0 optional-cert-secrets:0xc000877c20 optional-configmaps:0xc0008777c0 optional-secrets:0xc000877720 pod:0xc000877540 pod-manifest-dir:0xc000877900 pod-manifests-lock-file:0xc000877a40 resource-dir:0xc000877860 revision:0xc000877400 secrets:0xc0008775e0 timeout-duration:0xc0008779a0 v:0xc0008fe820 vmodule:0xc0008fe8c0] [0xc000877360 0xc000877400 0xc0008774a0 0xc000877540 0xc0008775e0 0xc000877680 0xc000877720 0xc0008777c0 0xc000877860 0xc000877900 0xc0008779a0 0xc000877a40 0xc000877ae0 0xc000877b80 0xc000877c20 0xc000877cc0 0xc000877d60 0xc0008fe780 0xc0008fe820 0xc0008fe8c0 0xc0008febe0] [0xc000877b80 0xc000877d60 0xc000877ae0 0xc000877680 0xc0008febe0 0xc000877360 0xc0008fe780 0xc0008774a0 0xc000877cc0 0xc000877c20 0xc0008777c0 0xc000877720 0xc000877540 0xc000877900 0xc000877a40 0xc000877860 0xc000877400 0xc0008775e0 0xc0008779a0 0xc0008fe820 0xc0008fe8c0] map[104:0xc0008febe0 118:0xc0008fe820] [] -1 0 0xc000811cb0 true 0x77b900 []} 2026-03-13T10:36:48.351669467Z I0313 10:36:48.351465 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0000541a0)({ 2026-03-13T10:36:48.351669467Z KubeConfig: (string) "", 2026-03-13T10:36:48.351669467Z KubeClient: (kubernetes.Interface) , 2026-03-13T10:36:48.351669467Z Revision: (string) (len=1) "1", 2026-03-13T10:36:48.351669467Z NodeName: (string) "", 2026-03-13T10:36:48.351669467Z Namespace: (string) (len=33) "openshift-kube-controller-manager", 2026-03-13T10:36:48.351669467Z Clock: (clock.RealClock) { 2026-03-13T10:36:48.351669467Z }, 2026-03-13T10:36:48.351669467Z PodConfigMapNamePrefix: (string) (len=27) "kube-controller-manager-pod", 2026-03-13T10:36:48.351669467Z SecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-13T10:36:48.351669467Z (string) (len=27) "service-account-private-key", 2026-03-13T10:36:48.351669467Z (string) (len=31) "localhost-recovery-client-token" 2026-03-13T10:36:48.351669467Z }, 2026-03-13T10:36:48.351669467Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T10:36:48.351669467Z (string) (len=12) "serving-cert" 2026-03-13T10:36:48.351669467Z }, 2026-03-13T10:36:48.351669467Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-13T10:36:48.351669467Z (string) (len=27) "kube-controller-manager-pod", 2026-03-13T10:36:48.351669467Z (string) (len=6) "config", 2026-03-13T10:36:48.351669467Z (string) (len=32) "cluster-policy-controller-config", 2026-03-13T10:36:48.351669467Z (string) (len=29) "controller-manager-kubeconfig", 2026-03-13T10:36:48.351669467Z (string) (len=38) "kube-controller-cert-syncer-kubeconfig", 2026-03-13T10:36:48.351669467Z (string) (len=17) "serviceaccount-ca", 2026-03-13T10:36:48.351669467Z (string) (len=10) "service-ca", 2026-03-13T10:36:48.351669467Z (string) (len=15) "recycler-config" 2026-03-13T10:36:48.351669467Z }, 2026-03-13T10:36:48.351669467Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T10:36:48.351669467Z (string) (len=12) "cloud-config" 2026-03-13T10:36:48.351669467Z }, 2026-03-13T10:36:48.351669467Z CertSecretNames: ([]string) (len=2 cap=2) { 2026-03-13T10:36:48.351669467Z (string) (len=39) "kube-controller-manager-client-cert-key", 2026-03-13T10:36:48.351669467Z (string) (len=10) "csr-signer" 2026-03-13T10:36:48.351669467Z }, 2026-03-13T10:36:48.351669467Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-13T10:36:48.351669467Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-13T10:36:48.351669467Z (string) (len=20) "aggregator-client-ca", 2026-03-13T10:36:48.351669467Z (string) (len=9) "client-ca" 2026-03-13T10:36:48.351669467Z }, 2026-03-13T10:36:48.351669467Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T10:36:48.351669467Z (string) (len=17) "trusted-ca-bundle" 2026-03-13T10:36:48.351669467Z }, 2026-03-13T10:36:48.351669467Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-13T10:36:48.351669467Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-13T10:36:48.351669467Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-13T10:36:48.351669467Z Timeout: (time.Duration) 2m0s, 2026-03-13T10:36:48.351669467Z StaticPodManifestsLockFile: (string) "", 2026-03-13T10:36:48.351669467Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-13T10:36:48.351669467Z KubeletVersion: (string) "" 2026-03-13T10:36:48.351669467Z }) 2026-03-13T10:36:48.438991754Z I0313 10:36:48.438899 1 cmd.go:413] Getting controller reference for node master-0 2026-03-13T10:37:44.781058377Z W0313 10:37:44.780939 1 cmd.go:423] unable to get owner reference (falling back to namespace): Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-1-master-0?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T10:37:44.781058377Z I0313 10:37:44.780997 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-13T10:37:44.781058377Z I0313 10:37:44.781048 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T10:37:44.781095878Z I0313 10:37:44.781057 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T10:37:58.782399592Z W0313 10:37:58.782257 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T10:38:22.786568980Z W0313 10:38:22.786452 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T10:38:42.786675139Z W0313 10:38:42.786513 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T10:38:48.439116302Z F0313 10:38:48.438983 1 cmd.go:109] timed out waiting for the condition config/pod/openshift-kube-controller-manager/installer-1-master-0.json0000640000000000000000000001710215154764724024477 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-controller-manager","uid":"feb7b798-15b5-4004-87d0-96ce9381cdbe","resourceVersion":"8275","creationTimestamp":"2026-03-13T10:36:45Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.47/23\"],\"mac_address\":\"0a:58:0a:80:00:2f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.47/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.47\"\n ],\n \"mac\": \"0a:58:0a:80:00:2f\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"a0041a38-b259-4a5e-88b4-1891d50fc48c"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["cluster-kube-controller-manager-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-controller-manager","--pod=kube-controller-manager-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-controller-manager-pod","--configmaps=config","--configmaps=cluster-policy-controller-config","--configmaps=controller-manager-kubeconfig","--optional-configmaps=cloud-config","--configmaps=kube-controller-cert-syncer-kubeconfig","--configmaps=serviceaccount-ca","--configmaps=service-ca","--configmaps=recycler-config","--secrets=service-account-private-key","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-controller-manager-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-secrets=kube-controller-manager-client-cert-key","--cert-secrets=csr-signer"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:54Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:45Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:50Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:50Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:45Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.47","podIPs":[{"ip":"10.128.0.47"}],"startTime":"2026-03-13T10:36:45Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"en=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0313 10:36:48.438899 1 cmd.go:413] Getting controller reference for node master-0\nW0313 10:37:44.780939 1 cmd.go:423] unable to get owner reference (falling back to namespace): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-1-master-0?timeout=14s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nI0313 10:37:44.780997 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0313 10:37:44.781048 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0313 10:37:44.781057 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nW0313 10:37:58.782257 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0313 10:38:22.786452 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0313 10:38:42.786513 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0313 10:38:48.438983 1 cmd.go:109] timed out waiting for the condition\n","startedAt":"2026-03-13T10:36:47Z","finishedAt":"2026-03-13T10:38:48Z","containerID":"cri-o://28aad4d86302888f158c61e3738904f7d878550af4392e7ed53add211247a0cd"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","containerID":"cri-o://28aad4d86302888f158c61e3738904f7d878550af4392e7ed53add211247a0cd","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715154764724027222 0ustar00000000000000002026-03-13T10:36:47.448921129Z I0313 10:36:47.448578 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc0008861e0 cert-dir:0xc0008863c0 cert-secrets:0xc000886140 configmaps:0xc000147a40 namespace:0xc000147680 optional-cert-configmaps:0xc000886320 optional-cert-secrets:0xc000886280 optional-configmaps:0xc000147cc0 optional-secrets:0xc000147b80 pod:0xc0001477c0 pod-manifest-dir:0xc0000e2a00 resource-dir:0xc0000e2280 revision:0xc0001472c0 secrets:0xc000147900 v:0xc0008877c0] [0xc0008877c0 0xc0001472c0 0xc000147680 0xc0001477c0 0xc0000e2280 0xc0000e2a00 0xc000147a40 0xc000147cc0 0xc000147900 0xc000147b80 0xc0008863c0 0xc0008861e0 0xc000886320 0xc000886140 0xc000886280] [] map[cert-configmaps:0xc0008861e0 cert-dir:0xc0008863c0 cert-secrets:0xc000886140 configmaps:0xc000147a40 help:0xc000887b80 kubeconfig:0xc000147180 log-flush-frequency:0xc000887720 namespace:0xc000147680 optional-cert-configmaps:0xc000886320 optional-cert-secrets:0xc000886280 optional-configmaps:0xc000147cc0 optional-secrets:0xc000147b80 pod:0xc0001477c0 pod-manifest-dir:0xc0000e2a00 pod-manifests-lock-file:0xc0008860a0 resource-dir:0xc0000e2280 revision:0xc0001472c0 secrets:0xc000147900 timeout-duration:0xc000886000 v:0xc0008877c0 vmodule:0xc000887860] [0xc000147180 0xc0001472c0 0xc000147680 0xc0001477c0 0xc000147900 0xc000147a40 0xc000147b80 0xc000147cc0 0xc0000e2280 0xc0000e2a00 0xc000886000 0xc0008860a0 0xc000886140 0xc0008861e0 0xc000886280 0xc000886320 0xc0008863c0 0xc000887720 0xc0008877c0 0xc000887860 0xc000887b80] [0xc0008861e0 0xc0008863c0 0xc000886140 0xc000147a40 0xc000887b80 0xc000147180 0xc000887720 0xc000147680 0xc000886320 0xc000886280 0xc000147cc0 0xc000147b80 0xc0001477c0 0xc0000e2a00 0xc0008860a0 0xc0000e2280 0xc0001472c0 0xc000147900 0xc000886000 0xc0008877c0 0xc000887860] map[104:0xc000887b80 118:0xc0008877c0] [] -1 0 0xc0007e5170 true 0xae2020 []} 2026-03-13T10:36:47.449119384Z I0313 10:36:47.448928 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0000f1ba0)({ 2026-03-13T10:36:47.449119384Z KubeConfig: (string) "", 2026-03-13T10:36:47.449119384Z KubeClient: (kubernetes.Interface) , 2026-03-13T10:36:47.449119384Z Revision: (string) (len=1) "1", 2026-03-13T10:36:47.449119384Z NodeName: (string) "", 2026-03-13T10:36:47.449119384Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-03-13T10:36:47.449119384Z Clock: (clock.RealClock) { 2026-03-13T10:36:47.449119384Z }, 2026-03-13T10:36:47.449119384Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-03-13T10:36:47.449119384Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-13T10:36:47.449119384Z (string) (len=11) "etcd-client", 2026-03-13T10:36:47.449119384Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-03-13T10:36:47.449119384Z (string) (len=31) "localhost-recovery-client-token" 2026-03-13T10:36:47.449119384Z }, 2026-03-13T10:36:47.449119384Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-13T10:36:47.449119384Z (string) (len=17) "encryption-config", 2026-03-13T10:36:47.449119384Z (string) (len=21) "webhook-authenticator" 2026-03-13T10:36:47.449119384Z }, 2026-03-13T10:36:47.449119384Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-13T10:36:47.449119384Z (string) (len=18) "kube-apiserver-pod", 2026-03-13T10:36:47.449119384Z (string) (len=6) "config", 2026-03-13T10:36:47.449119384Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-03-13T10:36:47.449119384Z (string) (len=28) "bound-sa-token-signing-certs", 2026-03-13T10:36:47.449119384Z (string) (len=15) "etcd-serving-ca", 2026-03-13T10:36:47.449119384Z (string) (len=18) "kubelet-serving-ca", 2026-03-13T10:36:47.449119384Z (string) (len=22) "sa-token-signing-certs", 2026-03-13T10:36:47.449119384Z (string) (len=29) "kube-apiserver-audit-policies" 2026-03-13T10:36:47.449119384Z }, 2026-03-13T10:36:47.449119384Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-13T10:36:47.449119384Z (string) (len=14) "oauth-metadata", 2026-03-13T10:36:47.449119384Z (string) (len=12) "cloud-config", 2026-03-13T10:36:47.449119384Z (string) (len=24) "kube-apiserver-server-ca" 2026-03-13T10:36:47.449119384Z }, 2026-03-13T10:36:47.449119384Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-03-13T10:36:47.449119384Z (string) (len=17) "aggregator-client", 2026-03-13T10:36:47.449119384Z (string) (len=30) "localhost-serving-cert-certkey", 2026-03-13T10:36:47.449119384Z (string) (len=31) "service-network-serving-certkey", 2026-03-13T10:36:47.449119384Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-03-13T10:36:47.449119384Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-03-13T10:36:47.449119384Z (string) (len=33) "bound-service-account-signing-key", 2026-03-13T10:36:47.449119384Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-03-13T10:36:47.449119384Z (string) (len=31) "check-endpoints-client-cert-key", 2026-03-13T10:36:47.449119384Z (string) (len=14) "kubelet-client", 2026-03-13T10:36:47.449119384Z (string) (len=16) "node-kubeconfigs" 2026-03-13T10:36:47.449119384Z }, 2026-03-13T10:36:47.449119384Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-03-13T10:36:47.449119384Z (string) (len=17) "user-serving-cert", 2026-03-13T10:36:47.449119384Z (string) (len=21) "user-serving-cert-000", 2026-03-13T10:36:47.449119384Z (string) (len=21) "user-serving-cert-001", 2026-03-13T10:36:47.449119384Z (string) (len=21) "user-serving-cert-002", 2026-03-13T10:36:47.449119384Z (string) (len=21) "user-serving-cert-003", 2026-03-13T10:36:47.449119384Z (string) (len=21) "user-serving-cert-004", 2026-03-13T10:36:47.449119384Z (string) (len=21) "user-serving-cert-005", 2026-03-13T10:36:47.449119384Z (string) (len=21) "user-serving-cert-006", 2026-03-13T10:36:47.449119384Z (string) (len=21) "user-serving-cert-007", 2026-03-13T10:36:47.449119384Z (string) (len=21) "user-serving-cert-008", 2026-03-13T10:36:47.449119384Z (string) (len=21) "user-serving-cert-009" 2026-03-13T10:36:47.449119384Z }, 2026-03-13T10:36:47.449119384Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-03-13T10:36:47.449119384Z (string) (len=20) "aggregator-client-ca", 2026-03-13T10:36:47.449119384Z (string) (len=9) "client-ca", 2026-03-13T10:36:47.449119384Z (string) (len=29) "control-plane-node-kubeconfig", 2026-03-13T10:36:47.449119384Z (string) (len=26) "check-endpoints-kubeconfig" 2026-03-13T10:36:47.449119384Z }, 2026-03-13T10:36:47.449119384Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T10:36:47.449119384Z (string) (len=17) "trusted-ca-bundle" 2026-03-13T10:36:47.449119384Z }, 2026-03-13T10:36:47.449119384Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-03-13T10:36:47.449119384Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-13T10:36:47.449119384Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-13T10:36:47.449119384Z Timeout: (time.Duration) 2m0s, 2026-03-13T10:36:47.449119384Z StaticPodManifestsLockFile: (string) "", 2026-03-13T10:36:47.449119384Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-13T10:36:47.449119384Z KubeletVersion: (string) "" 2026-03-13T10:36:47.449119384Z }) 2026-03-13T10:36:47.543187064Z I0313 10:36:47.541784 1 cmd.go:413] Getting controller reference for node master-0 2026-03-13T10:36:47.834310942Z I0313 10:36:47.832764 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-13T10:36:47.834310942Z I0313 10:36:47.832824 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T10:36:47.834310942Z I0313 10:36:47.832835 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T10:36:47.878698420Z I0313 10:36:47.876243 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-13T10:37:17.876731546Z I0313 10:37:17.876582 1 cmd.go:524] Getting installer pods for node master-0 2026-03-13T10:37:31.879900827Z F0313 10:37:31.879785 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115154764724022702 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"7baf3efc-04dc-4c17-9c2a-397ac022d281","resourceVersion":"7385","creationTimestamp":"2026-03-13T10:36:45Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.46/23\"],\"mac_address\":\"0a:58:0a:80:00:2e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.46/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.46\"\n ],\n \"mac\": \"0a:58:0a:80:00:2e\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"7f0528ec-8305-441e-8899-056e58a16aad"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:45Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:42Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:42Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:45Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.46","podIPs":[{"ip":"10.128.0.46"}],"startTime":"2026-03-13T10:36:45Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0313 10:36:47.541784 1 cmd.go:413] Getting controller reference for node master-0\nI0313 10:36:47.832764 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0313 10:36:47.832824 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0313 10:36:47.832835 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0313 10:36:47.876243 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0313 10:37:17.876582 1 cmd.go:524] Getting installer pods for node master-0\nF0313 10:37:31.879785 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-13T10:36:46Z","finishedAt":"2026-03-13T10:37:31Z","containerID":"cri-o://56c9b868392613f72b3a821d9f4fd3508fb4759378ef047d1a2286ea13733ed0"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","containerID":"cri-o://56c9b868392613f72b3a821d9f4fd3508fb4759378ef047d1a2286ea13733ed0","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615154764724036002 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-13T10:33:01.710462964Z I0313 10:33:01.710142 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000010321315154764724032672 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-13T10:41:07.367708971Z I0313 10:41:07.367638 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:07.436293658Z E0313 10:41:07.436220 1 remote_available_controller.go:470] "Unhandled Error" err="v1beta1.metrics.k8s.io failed with: failing or missing response from https://10.128.0.68:10250/apis/metrics.k8s.io/v1beta1: bad status from https://10.128.0.68:10250/apis/metrics.k8s.io/v1beta1: 401" logger="UnhandledError" 2026-03-13T10:41:07.472539354Z I0313 10:41:07.472463 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:07.511715568Z I0313 10:41:07.511562 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:07.568476477Z I0313 10:41:07.568367 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:07.607156648Z E0313 10:41:07.607039 1 remote_available_controller.go:470] "Unhandled Error" err="v1beta1.metrics.k8s.io failed with: failing or missing response from https://10.128.0.68:10250/apis/metrics.k8s.io/v1beta1: bad status from https://10.128.0.68:10250/apis/metrics.k8s.io/v1beta1: 401" logger="UnhandledError" 2026-03-13T10:41:07.672696713Z I0313 10:41:07.672544 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:07.711528618Z I0313 10:41:07.711415 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:07.767728611Z I0313 10:41:07.767615 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:07.872278236Z I0313 10:41:07.872137 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:07.911518863Z I0313 10:41:07.911391 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:07.937728768Z E0313 10:41:07.937612 1 remote_available_controller.go:470] "Unhandled Error" err="v1beta1.metrics.k8s.io failed with: failing or missing response from https://10.128.0.68:10250/apis/metrics.k8s.io/v1beta1: bad status from https://10.128.0.68:10250/apis/metrics.k8s.io/v1beta1: 401" logger="UnhandledError" 2026-03-13T10:41:07.968219449Z I0313 10:41:07.968079 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:08.072790185Z I0313 10:41:08.072728 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:08.112111254Z I0313 10:41:08.112029 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:08.168360417Z I0313 10:41:08.168279 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:08.245181065Z W0313 10:41:08.245122 1 handler_proxy.go:100] no RequestInfo found in the context 2026-03-13T10:41:08.245217046Z E0313 10:41:08.245161 1 controller.go:113] "Unhandled Error" err="loading OpenAPI spec for \"v1beta1.metrics.k8s.io\" failed with: Error, could not get list of group versions for APIService" logger="UnhandledError" 2026-03-13T10:41:08.245217046Z W0313 10:41:08.245172 1 handler_proxy.go:100] no RequestInfo found in the context 2026-03-13T10:41:08.245267578Z E0313 10:41:08.245237 1 controller.go:102] "Unhandled Error" err=< 2026-03-13T10:41:08.245267578Z loading OpenAPI spec for "v1beta1.metrics.k8s.io" failed with: failed to download v1beta1.metrics.k8s.io: failed to retrieve openAPI spec, http error: ResponseCode: 503, Body: service unavailable 2026-03-13T10:41:08.245267578Z , Header: map[Content-Type:[text/plain; charset=utf-8] X-Content-Type-Options:[nosniff]] 2026-03-13T10:41:08.245267578Z > logger="UnhandledError" 2026-03-13T10:41:08.246402208Z I0313 10:41:08.246338 1 controller.go:109] OpenAPI AggregationController: action for item v1beta1.metrics.k8s.io: Rate Limited Requeue. 2026-03-13T10:41:08.246418829Z I0313 10:41:08.246356 1 controller.go:126] OpenAPI AggregationController: action for item v1beta1.metrics.k8s.io: Rate Limited Requeue. 2026-03-13T10:41:08.272100390Z I0313 10:41:08.272059 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:08.311134671Z I0313 10:41:08.311082 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:08.367506949Z I0313 10:41:08.367415 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:08.472165397Z I0313 10:41:08.472087 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:08.512146303Z I0313 10:41:08.512066 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:08.568025447Z I0313 10:41:08.567956 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:08.586412073Z E0313 10:41:08.586354 1 remote_available_controller.go:470] "Unhandled Error" err="v1beta1.metrics.k8s.io failed with: failing or missing response from https://10.128.0.68:10250/apis/metrics.k8s.io/v1beta1: bad status from https://10.128.0.68:10250/apis/metrics.k8s.io/v1beta1: 401" logger="UnhandledError" 2026-03-13T10:41:08.672223983Z I0313 10:41:08.672146 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:08.712199109Z I0313 10:41:08.712093 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:08.767866928Z I0313 10:41:08.767776 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:08.872425853Z I0313 10:41:08.872322 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:08.911612568Z I0313 10:41:08.911476 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:08.968182641Z I0313 10:41:08.968092 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:09.072605253Z I0313 10:41:09.072502 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:09.111814278Z I0313 10:41:09.111713 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:09.167928489Z I0313 10:41:09.167846 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:09.272515595Z I0313 10:41:09.272420 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:09.311141055Z I0313 10:41:09.311057 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:09.368260843Z I0313 10:41:09.368171 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:09.472822808Z I0313 10:41:09.472717 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:09.511120179Z I0313 10:41:09.511062 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:09.567992270Z I0313 10:41:09.567896 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:09.671808686Z I0313 10:41:09.671691 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:09.711725540Z I0313 10:41:09.711654 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:09.769618709Z I0313 10:41:09.769494 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:09.875386827Z I0313 10:41:09.875318 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:09.879011854Z E0313 10:41:09.878974 1 remote_available_controller.go:470] "Unhandled Error" err="v1beta1.metrics.k8s.io failed with: failing or missing response from https://10.128.0.68:10250/apis/metrics.k8s.io/v1beta1: bad status from https://10.128.0.68:10250/apis/metrics.k8s.io/v1beta1: 401" logger="UnhandledError" 2026-03-13T10:41:09.911618602Z I0313 10:41:09.911567 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:09.967728393Z I0313 10:41:09.967654 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:10.072940486Z I0313 10:41:10.072867 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:10.111731510Z I0313 10:41:10.111656 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:10.167919093Z I0313 10:41:10.167836 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:10.272683883Z I0313 10:41:10.272559 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:10.311252542Z I0313 10:41:10.311179 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:10.369003727Z I0313 10:41:10.368932 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:10.474676012Z I0313 10:41:10.472096 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:10.512169761Z I0313 10:41:10.512100 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:10.567212273Z I0313 10:41:10.567150 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:10.672928380Z I0313 10:41:10.672877 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:10.711447087Z I0313 10:41:10.711385 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:10.768570065Z I0313 10:41:10.768479 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:10.872373639Z I0313 10:41:10.872295 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:10.911834782Z I0313 10:41:10.911775 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:10.967315376Z I0313 10:41:10.967196 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:11.072389215Z I0313 10:41:11.072316 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:11.110960273Z I0313 10:41:11.110894 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:11.168452661Z I0313 10:41:11.168374 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:11.272216025Z I0313 10:41:11.272146 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:11.310849675Z I0313 10:41:11.310779 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:11.368287661Z I0313 10:41:11.368229 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:11.472104957Z I0313 10:41:11.472013 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:11.511339623Z I0313 10:41:11.511276 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:11.567444793Z I0313 10:41:11.567386 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:11.672807050Z I0313 10:41:11.672740 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:11.768071614Z I0313 10:41:11.767977 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:11.872485245Z I0313 10:41:11.872398 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:11.967818492Z I0313 10:41:11.967729 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:12.072034408Z I0313 10:41:12.071956 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:12.168102374Z I0313 10:41:12.168016 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:12.272967668Z I0313 10:41:12.272869 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:12.368045128Z I0313 10:41:12.367934 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:12.425176316Z E0313 10:41:12.425089 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.60:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.60:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-03-13T10:41:12.451034872Z E0313 10:41:12.450968 1 remote_available_controller.go:470] "Unhandled Error" err="v1beta1.metrics.k8s.io failed with: failing or missing response from https://10.128.0.68:10250/apis/metrics.k8s.io/v1beta1: bad status from https://10.128.0.68:10250/apis/metrics.k8s.io/v1beta1: 401" logger="UnhandledError" 2026-03-13T10:41:12.568196227Z I0313 10:41:12.568118 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:12.768147850Z I0313 10:41:12.768063 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:12.967732824Z I0313 10:41:12.967683 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:13.168240862Z I0313 10:41:13.168168 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:13.367683432Z I0313 10:41:13.367609 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:13.567493872Z I0313 10:41:13.567445 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:13.767477236Z I0313 10:41:13.767423 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:13.968170940Z I0313 10:41:13.968068 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:14.168026110Z I0313 10:41:14.167933 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:14.367957723Z I0313 10:41:14.367849 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:14.568625596Z I0313 10:41:14.568509 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T10:41:14.767545052Z I0313 10:41:14.767465 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015154764724031162 0ustar00000000000000002026-03-13T10:32:57.670833117Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000001015115154764724036742 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-68bd585b-vqdk82026-03-13T10:38:44.045635946Z I0313 10:38:44.043458 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T10:38:44.045635946Z I0313 10:38:44.043618 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T10:38:44.045635946Z I0313 10:38:44.043992 1 observer_polling.go:159] Starting file observer 2026-03-13T10:38:44.063319703Z I0313 10:38:44.063274 1 builder.go:304] kube-apiserver-operator version 4.18.0-202602132343.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-13T10:38:44.564347412Z I0313 10:38:44.564293 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T10:38:44.564347412Z W0313 10:38:44.564321 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:38:44.564347412Z W0313 10:38:44.564325 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:38:44.564347412Z W0313 10:38:44.564329 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T10:38:44.564347412Z W0313 10:38:44.564332 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T10:38:44.564347412Z W0313 10:38:44.564335 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T10:38:44.564347412Z W0313 10:38:44.564339 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T10:38:44.570174878Z I0313 10:38:44.569633 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T10:38:44.570174878Z I0313 10:38:44.569681 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T10:38:44.570174878Z I0313 10:38:44.569756 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T10:38:44.570174878Z I0313 10:38:44.569797 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T10:38:44.570174878Z I0313 10:38:44.569908 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T10:38:44.570174878Z I0313 10:38:44.570011 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:38:44.570174878Z I0313 10:38:44.570017 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:38:44.570174878Z I0313 10:38:44.570030 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T10:38:44.570174878Z I0313 10:38:44.570035 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:38:44.602116548Z I0313 10:38:44.601950 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T10:38:44.602648074Z I0313 10:38:44.602260 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock... 2026-03-13T10:38:44.670425372Z I0313 10:38:44.670358 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:38:44.670494784Z I0313 10:38:44.670444 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:38:44.670706030Z I0313 10:38:44.670358 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController kube-apiserver-operator_previous.log0000640000000000000000000004736715154764724037157 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-68bd585b-vqdk82026-03-13T10:37:12.702768080Z E0313 10:37:12.701543 1 termination_observer.go:175] "Unhandled Error" err="key failed with : unable to list pods in \"openshift-kube-apiserver\" namespace: client rate limiter Wait returned an error: context canceled" 2026-03-13T10:37:12.702768080Z I0313 10:37:12.701547 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-13T10:37:12.702768080Z I0313 10:37:12.701559 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T10:37:12.702768080Z I0313 10:37:12.701615 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T10:37:12.702768080Z I0313 10:37:12.701651 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T10:37:12.702768080Z I0313 10:37:12.701762 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:37:12.702768080Z I0313 10:37:12.701793 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-13T10:37:12.702768080Z I0313 10:37:12.701811 1 builder.go:335] server exited 2026-03-13T10:37:12.702768080Z I0313 10:37:12.701812 1 base_controller.go:181] Shutting down Installer ... 2026-03-13T10:37:12.702768080Z E0313 10:37:12.701794 1 base_controller.go:279] "Unhandled Error" err="kube-apiserver-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-apiserver-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-13T10:37:12.702768080Z I0313 10:37:12.701864 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-13T10:37:12.702768080Z I0313 10:37:12.701919 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T10:37:12.702768080Z I0313 10:37:12.701929 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T10:37:12.702768080Z I0313 10:37:12.701934 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-2643636214/tls.crt::/tmp/serving-cert-2643636214/tls.key" 2026-03-13T10:37:12.702768080Z I0313 10:37:12.701949 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T10:37:12.702768080Z I0313 10:37:12.701959 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T10:37:12.702768080Z I0313 10:37:12.701972 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T10:37:12.702768080Z I0313 10:37:12.701985 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702000 1 base_controller.go:123] Shutting down worker of highCPUUsageAlertController controller ... 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702010 1 base_controller.go:113] All highCPUUsageAlertController workers have been terminated 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702021 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702027 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702037 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702044 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702055 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702063 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702075 1 base_controller.go:123] Shutting down worker of BoundSATokenSignerController controller ... 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702083 1 base_controller.go:113] All BoundSATokenSignerController workers have been terminated 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702099 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702111 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702118 1 controller_manager.go:54] PruneController controller terminated 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702195 1 base_controller.go:181] Shutting down ServiceAccountIssuerController ... 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702205 1 base_controller.go:123] Shutting down worker of kube-apiserver-InstallerState controller ... 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702216 1 base_controller.go:113] All kube-apiserver-InstallerState workers have been terminated 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702221 1 base_controller.go:181] Shutting down StatusSyncer_kube-apiserver ... 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702228 1 base_controller.go:159] All StatusSyncer_kube-apiserver post start hooks have been terminated 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702231 1 controller_manager.go:54] kube-apiserver-InstallerState controller terminated 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702242 1 certrotationcontroller.go:828] Shutting down CertRotation 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702258 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-13T10:37:12.702768080Z I0313 10:37:12.702286 1 base_controller.go:181] Shutting down kube-apiserver-RemoveStaleConditions ... 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702301 1 base_controller.go:181] Shutting down SCCReconcileController ... 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702316 1 base_controller.go:123] Shutting down worker of kube-apiserver-RemoveStaleConditions controller ... 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702323 1 base_controller.go:113] All kube-apiserver-RemoveStaleConditions workers have been terminated 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702332 1 base_controller.go:123] Shutting down worker of SCCReconcileController controller ... 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702339 1 base_controller.go:113] All SCCReconcileController workers have been terminated 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702342 1 base_controller.go:181] Shutting down GuardController ... 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702360 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702366 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702370 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-apiserver controller ... 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702371 1 controller_manager.go:54] GuardController controller terminated 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702384 1 base_controller.go:113] All StatusSyncer_kube-apiserver workers have been terminated 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702388 1 base_controller.go:123] Shutting down worker of ServiceAccountIssuerController controller ... 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702396 1 base_controller.go:113] All ServiceAccountIssuerController workers have been terminated 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702406 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702416 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702433 1 base_controller.go:123] Shutting down worker of cluster-kube-apiserver-operator-UnsupportedConfigOverrides controller ... 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702444 1 base_controller.go:113] All cluster-kube-apiserver-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702453 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702453 1 controller_manager.go:54] cluster-kube-apiserver-operator-UnsupportedConfigOverrides controller terminated 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702462 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702469 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702507 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702515 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702531 1 base_controller.go:123] Shutting down worker of webhookSupportabilityController controller ... 2026-03-13T10:37:12.702805001Z I0313 10:37:12.702539 1 base_controller.go:113] All webhookSupportabilityController workers have been terminated 2026-03-13T10:37:12.703042309Z I0313 10:37:12.703018 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"aa6dce30-9304-42c4-a8b7-4572d0bd6a15", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ConfigMapCreateFailed' Failed to create ConfigMap/config-2 -n openshift-kube-apiserver: Post "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps": context canceled 2026-03-13T10:37:12.703096840Z I0313 10:37:12.703086 1 base_controller.go:123] Shutting down worker of kube-apiserver-StaticPodState controller ... 2026-03-13T10:37:12.703123181Z I0313 10:37:12.703114 1 base_controller.go:113] All kube-apiserver-StaticPodState workers have been terminated 2026-03-13T10:37:12.703146302Z I0313 10:37:12.703137 1 controller_manager.go:54] kube-apiserver-StaticPodState controller terminated 2026-03-13T10:37:12.703299336Z W0313 10:37:12.703269 1 base_controller.go:242] Updating status of "RevisionController" failed: unable to ApplyStatus for operator using fieldManager "RevisionController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-13T10:37:12.703308847Z E0313 10:37:12.703301 1 base_controller.go:279] "Unhandled Error" err="RevisionController reconciliation failed: Post \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps\": context canceled" 2026-03-13T10:37:12.703399519Z W0313 10:37:12.703365 1 base_controller.go:242] Updating status of "NodeKubeconfigController" failed: unable to ApplyStatus for operator using fieldManager "NodeKubeconfigController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-13T10:37:12.703399519Z I0313 10:37:12.703363 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"aa6dce30-9304-42c4-a8b7-4572d0bd6a15", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' Failed to create installer pod for revision 1 count 0 on node "master-0": client rate limiter Wait returned an error: context canceled 2026-03-13T10:37:12.703434730Z E0313 10:37:12.703410 1 base_controller.go:279] "Unhandled Error" err="NodeKubeconfigController reconciliation failed: \"secret/node-kubeconfigs\": Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/node-kubeconfigs\": context canceled" 2026-03-13T10:37:12.704641647Z E0313 10:37:12.704583 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-13T10:37:12.704713969Z I0313 10:37:12.704672 1 base_controller.go:123] Shutting down worker of NodeKubeconfigController controller ... 2026-03-13T10:37:12.704713969Z I0313 10:37:12.704694 1 base_controller.go:113] All NodeKubeconfigController workers have been terminated 2026-03-13T10:37:12.704742180Z I0313 10:37:12.704722 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-13T10:37:12.704751570Z I0313 10:37:12.704745 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-13T10:37:12.704760301Z I0313 10:37:12.704754 1 controller_manager.go:54] RevisionController controller terminated 2026-03-13T10:37:12.705150312Z E0313 10:37:12.705130 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T10:37:12.705438681Z W0313 10:37:12.705329 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-13T10:37:12.705438681Z W0313 10:37:12.705359 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-13T10:37:12.705438681Z W0313 10:37:12.705366 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-13T10:37:12.705555435Z E0313 10:37:12.705505 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-apiserver-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-13T10:37:12.705726070Z I0313 10:37:12.705710 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-13T10:37:12.705768751Z I0313 10:37:12.705759 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-13T10:37:12.706960557Z I0313 10:37:12.706931 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-13T10:37:12.706975508Z I0313 10:37:12.706957 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-13T10:37:12.706975508Z I0313 10:37:12.706969 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-13T10:37:12.706997559Z I0313 10:37:12.706941 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-13T10:37:12.707034510Z I0313 10:37:12.707025 1 base_controller.go:113] All Installer workers have been terminated 2026-03-13T10:37:12.707065911Z I0313 10:37:12.707057 1 controller_manager.go:54] Installer controller terminated 2026-03-13T10:37:12.711133384Z E0313 10:37:12.711032 1 base_controller.go:279] "Unhandled Error" err="KubeAPIServerStaticResources-StaticResources reconciliation failed: [\"assets/kube-apiserver/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver\": context canceled, \"assets/kube-apiserver/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-clusterrole-node-reader.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-clusterrole-crd-reader.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-clusterrolebinding-auth-delegator.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-clusterrolebinding-node-reader.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-clusterrolebinding-crd-reader.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-rolebinding-kube-system.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/delegated-incluster-authentication-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/api-usage.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/audit-errors.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-requests.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-basic.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/podsecurity-violations.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-extended.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeAPIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T10:37:12.712438074Z I0313 10:37:12.712384 1 base_controller.go:123] Shutting down worker of KubeAPIServerStaticResources-StaticResources controller ... 2026-03-13T10:37:12.712438074Z I0313 10:37:12.712414 1 base_controller.go:113] All KubeAPIServerStaticResources-StaticResources workers have been terminated 2026-03-13T10:37:17.698045032Z I0313 10:37:17.697936 1 observer_polling.go:162] Shutting down file observer 2026-03-13T10:37:46.707253228Z E0313 10:37:46.707154 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T10:37:46.707253228Z W0313 10:37:46.707200 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-vqdk8.json0000640000000000000000000001362015154764724027732 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-68bd585b-vqdk8","generateName":"kube-apiserver-operator-68bd585b-","namespace":"openshift-kube-apiserver-operator","uid":"86ae8cb8-72b3-4be6-9feb-ee0c0da42dba","resourceVersion":"7397","creationTimestamp":"2026-03-13T10:33:25Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"68bd585b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.16/23\"],\"mac_address\":\"0a:58:0a:80:00:10\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.16/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.16\"\n ],\n \"mac\": \"0a:58:0a:80:00:10\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-68bd585b","uid":"d4c6af67-c4a8-4bd5-ab63-8a97520afdab","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:38Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.16","podIPs":[{"ip":"10.128.0.16"}],"startTime":"2026-03-13T10:35:36Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-03-13T10:38:43Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T10:35:37Z","finishedAt":"2026-03-13T10:37:46Z","containerID":"cri-o://2c461d42e265a3320bcaee208db9040eedffe39900d9e8aa36490e00a5c604c0"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","containerID":"cri-o://5cf7d401ea622e52729b46eea598afe245447756a5d119bc7987bfb6c5cfb794","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007242515154764724025223 0ustar00000000000000002026-03-13T10:36:47.987910818Z 2026-03-13T10:36:47.987910818Z cluster-etcd-operator rev \ 2026-03-13T10:36:47.987910818Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-03-13T10:36:47.987910818Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-03-13T10:36:47.987910818Z --client-key-file=$(ETCDCTL_KEY) \ 2026-03-13T10:36:47.987910818Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-03-13T10:36:47.987910818Z securityContext: 2026-03-13T10:36:47.987910818Z privileged: true 2026-03-13T10:36:47.987910818Z resources: 2026-03-13T10:36:47.987910818Z requests: 2026-03-13T10:36:47.987910818Z memory: 50Mi 2026-03-13T10:36:47.987910818Z cpu: 10m 2026-03-13T10:36:47.987910818Z env: 2026-03-13T10:36:47.987910818Z - name: "ALL_ETCD_ENDPOINTS" 2026-03-13T10:36:47.987910818Z value: "https://192.168.32.10:2379" 2026-03-13T10:36:47.987910818Z - name: "ETCDCTL_API" 2026-03-13T10:36:47.987910818Z value: "3" 2026-03-13T10:36:47.987910818Z - name: "ETCDCTL_CACERT" 2026-03-13T10:36:47.987910818Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-03-13T10:36:47.987910818Z - name: "ETCDCTL_CERT" 2026-03-13T10:36:47.987910818Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-03-13T10:36:47.987910818Z - name: "ETCDCTL_ENDPOINTS" 2026-03-13T10:36:47.987910818Z value: "https://192.168.32.10:2379" 2026-03-13T10:36:47.987910818Z - name: "ETCDCTL_KEY" 2026-03-13T10:36:47.987910818Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-03-13T10:36:47.987910818Z - name: "ETCD_CIPHER_SUITES" 2026-03-13T10:36:47.987910818Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-03-13T10:36:47.987910818Z - name: "ETCD_DATA_DIR" 2026-03-13T10:36:47.987910818Z value: "/var/lib/etcd" 2026-03-13T10:36:47.987910818Z - name: "ETCD_ELECTION_TIMEOUT" 2026-03-13T10:36:47.987910818Z value: "2500" 2026-03-13T10:36:47.987910818Z - name: "ETCD_ENABLE_PPROF" 2026-03-13T10:36:47.987997530Z value: "true" 2026-03-13T10:36:47.987997530Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-03-13T10:36:47.987997530Z value: "1" 2026-03-13T10:36:47.987997530Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-03-13T10:36:47.987997530Z value: "200ms" 2026-03-13T10:36:47.987997530Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-03-13T10:36:47.987997530Z value: "5s" 2026-03-13T10:36:47.987997530Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-03-13T10:36:47.987997530Z value: "500" 2026-03-13T10:36:47.987997530Z - name: "ETCD_IMAGE" 2026-03-13T10:36:47.987997530Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b" 2026-03-13T10:36:47.987997530Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-03-13T10:36:47.987997530Z value: "existing" 2026-03-13T10:36:47.987997530Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-03-13T10:36:47.987997530Z value: "8589934592" 2026-03-13T10:36:47.987997530Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-03-13T10:36:47.987997530Z value: "true" 2026-03-13T10:36:47.987997530Z - name: "ETCD_TLS_MIN_VERSION" 2026-03-13T10:36:47.987997530Z value: "TLS1.2" 2026-03-13T10:36:47.987997530Z - name: "NODE_master_0_ETCD_NAME" 2026-03-13T10:36:47.987997530Z value: "master-0" 2026-03-13T10:36:47.987997530Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-03-13T10:36:47.987997530Z value: "192.168.32.10" 2026-03-13T10:36:47.987997530Z - name: "NODE_master_0_IP" 2026-03-13T10:36:47.987997530Z value: "192.168.32.10" 2026-03-13T10:36:47.987997530Z volumeMounts: 2026-03-13T10:36:47.987997530Z - mountPath: /var/lib/etcd 2026-03-13T10:36:47.987997530Z name: data-dir 2026-03-13T10:36:47.987997530Z - mountPath: /etc/kubernetes/static-pod-certs 2026-03-13T10:36:47.987997530Z name: cert-dir 2026-03-13T10:36:47.987997530Z hostNetwork: true 2026-03-13T10:36:47.987997530Z priority: 2000001000 2026-03-13T10:36:47.987997530Z priorityClassName: system-node-critical 2026-03-13T10:36:47.987997530Z tolerations: 2026-03-13T10:36:47.987997530Z - operator: "Exists" 2026-03-13T10:36:47.987997530Z volumes: 2026-03-13T10:36:47.987997530Z - hostPath: 2026-03-13T10:36:47.987997530Z path: /etc/kubernetes/manifests 2026-03-13T10:36:47.987997530Z name: static-pod-dir 2026-03-13T10:36:47.987997530Z - hostPath: 2026-03-13T10:36:47.987997530Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-03-13T10:36:47.987997530Z name: resource-dir 2026-03-13T10:36:47.987997530Z - hostPath: 2026-03-13T10:36:47.987997530Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-03-13T10:36:47.987997530Z name: cert-dir 2026-03-13T10:36:47.987997530Z - hostPath: 2026-03-13T10:36:47.987997530Z path: /var/lib/etcd 2026-03-13T10:36:47.987997530Z type: "" 2026-03-13T10:36:47.987997530Z name: data-dir 2026-03-13T10:36:47.987997530Z - hostPath: 2026-03-13T10:36:47.987997530Z path: /usr/local/bin 2026-03-13T10:36:47.987997530Z name: usr-local-bin 2026-03-13T10:36:47.987997530Z - hostPath: 2026-03-13T10:36:47.987997530Z path: /var/log/etcd 2026-03-13T10:36:47.987997530Z name: log-dir 2026-03-13T10:36:47.987997530Z - hostPath: 2026-03-13T10:36:47.987997530Z path: /etc/kubernetes 2026-03-13T10:36:47.987997530Z name: config-dir 2026-03-13T10:36:47.987997530Z - hostPath: 2026-03-13T10:36:47.987997530Z path: /var/lib/etcd-auto-backup 2026-03-13T10:36:47.987997530Z name: etcd-auto-backup-dir 2026-03-13T10:36:48.066662164Z I0313 10:36:48.064388 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-03-13T10:36:48.066662164Z I0313 10:36:48.065441 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-13T10:36:48.066662164Z I0313 10:36:48.065453 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-13T10:36:48.066662164Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} config/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000001666515154764724023527 0ustar00000000000000002026-03-13T10:37:55.312238944Z I0313 10:37:55.311912 1 etcdcli_pool.go:70] creating a new cached client 2026-03-13T10:37:55.314127601Z 2026/03/13 10:37:55 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:37:55.314127601Z 2026/03/13 10:37:55 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:37:56.314769966Z 2026/03/13 10:37:56 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:37:56.314769966Z 2026/03/13 10:37:56 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:37:57.608544700Z 2026/03/13 10:37:57 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:37:57.830098676Z 2026/03/13 10:37:57 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:37:59.871758281Z 2026/03/13 10:37:59 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:00.100471994Z 2026/03/13 10:38:00 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:03.850398074Z 2026/03/13 10:38:03 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:04.098278698Z 2026/03/13 10:38:04 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:05.312817966Z {"level":"warn","ts":"2026-03-13T10:38:05.312656Z","logger":"etcd-client","caller":"v3@v3.5.14/retry_interceptor.go:63","msg":"retrying of unary invoker failed","target":"etcd-endpoints://0xc000a28000/192.168.32.10:2379","attempt":0,"error":"rpc error: code = DeadlineExceeded desc = latest balancer error: last connection error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused\""} 2026-03-13T10:38:05.313015872Z E0313 10:38:05.312995 1 rev.go:160] error getting status from [https://192.168.32.10:2379]: context deadline exceeded 2026-03-13T10:38:05.313096165Z E0313 10:38:05.313086 1 rev.go:176] could not reach any endpoint to get the raft index 2026-03-13T10:38:05.314411135Z 2026/03/13 10:38:05 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:06.315241125Z 2026/03/13 10:38:06 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:07.956272868Z 2026/03/13 10:38:07 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:10.030383857Z 2026/03/13 10:38:10 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:10.925729606Z 2026/03/13 10:38:10 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:14.515800882Z 2026/03/13 10:38:14 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:15.314035143Z {"level":"warn","ts":"2026-03-13T10:38:15.31388Z","logger":"etcd-client","caller":"v3@v3.5.14/retry_interceptor.go:63","msg":"retrying of unary invoker failed","target":"etcd-endpoints://0xc000a28000/192.168.32.10:2379","attempt":0,"error":"rpc error: code = DeadlineExceeded desc = latest balancer error: last connection error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused\""} 2026-03-13T10:38:15.314116545Z E0313 10:38:15.314077 1 rev.go:160] error getting status from [https://192.168.32.10:2379]: context deadline exceeded 2026-03-13T10:38:15.314116545Z E0313 10:38:15.314098 1 rev.go:176] could not reach any endpoint to get the raft index 2026-03-13T10:38:15.314855668Z 2026/03/13 10:38:15 WARNING: [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T10:38:16.316607074Z 2026/03/13 10:38:16 WARNING: [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000000050215154764724024210 0ustar00000000000000002026-03-13T10:37:45.049663360Z I0313 10:37:45.049400 1 readyz.go:175] Listening on 0.0.0.0:9980 2026-03-13T10:38:51.161347916Z I0313 10:38:51.161273 1 etcdcli_pool.go:70] creating a new cached client 2026-03-13T10:38:56.161936220Z I0313 10:38:56.161860 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000005771615154764724024403 0ustar00000000000000002026-03-13T10:37:44.778409646Z {"level":"info","ts":"2026-03-13T10:37:44.778179Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-13T10:37:44.778976333Z {"level":"info","ts":"2026-03-13T10:37:44.778935Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2026-03-13T10:37:44.779151779Z {"level":"info","ts":"2026-03-13T10:37:44.779110Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-13T10:37:44.779264732Z {"level":"info","ts":"2026-03-13T10:37:44.779207Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2026-03-13T10:37:44.779293803Z {"level":"info","ts":"2026-03-13T10:37:44.779273Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc0001c6000/192.168.32.10:9978\""} 2026-03-13T10:37:44.779316984Z {"level":"info","ts":"2026-03-13T10:37:44.779300Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc0001c6000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2026-03-13T10:37:44.779324374Z {"level":"info","ts":"2026-03-13T10:37:44.779312Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2026-03-13T10:37:44.779627833Z {"level":"info","ts":"2026-03-13T10:37:44.779572Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2026-03-13T10:37:44.779704516Z {"level":"info","ts":"2026-03-13T10:37:44.779647Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2026-03-13T10:37:44.779766107Z {"level":"info","ts":"2026-03-13T10:37:44.779732Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc00030f080 } }"} 2026-03-13T10:37:44.779773978Z {"level":"info","ts":"2026-03-13T10:37:44.779759Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2026-03-13T10:37:44.779805839Z {"level":"info","ts":"2026-03-13T10:37:44.779786Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2026-03-13T10:37:44.779826099Z {"level":"info","ts":"2026-03-13T10:37:44.779803Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2026-03-13T10:37:44.780149889Z {"level":"info","ts":"2026-03-13T10:37:44.779948Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T10:37:44.780149889Z {"level":"info","ts":"2026-03-13T10:37:44.780068Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T10:37:44.780690365Z {"level":"info","ts":"2026-03-13T10:37:44.780233Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, CONNECTING"} 2026-03-13T10:37:44.783378377Z {"level":"info","ts":"2026-03-13T10:37:44.782887Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:44.783378377Z {"level":"warn","ts":"2026-03-13T10:37:44.782978Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:44.783378377Z {"level":"info","ts":"2026-03-13T10:37:44.783020Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:44.783378377Z {"level":"info","ts":"2026-03-13T10:37:44.783068Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, TRANSIENT_FAILURE"} 2026-03-13T10:37:44.783378377Z {"level":"info","ts":"2026-03-13T10:37:44.783126Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2026-03-13T10:37:44.783808300Z {"level":"info","ts":"2026-03-13T10:37:44.783747Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2026-03-13T10:37:44.783989786Z {"level":"info","ts":"2026-03-13T10:37:44.783936Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2026-03-13T10:37:44.785186322Z {"level":"info","ts":"2026-03-13T10:37:44.785098Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2026-03-13T10:37:44.785211723Z {"level":"info","ts":"2026-03-13T10:37:44.785165Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2026-03-13T10:37:44.785211723Z {"level":"info","ts":"2026-03-13T10:37:44.785187Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-03-13T10:37:44.785211723Z {"level":"info","ts":"2026-03-13T10:37:44.785200Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-03-13T10:37:44.785454840Z {"level":"info","ts":"2026-03-13T10:37:44.785424Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2026-03-13T10:37:45.784122635Z {"level":"info","ts":"2026-03-13T10:37:45.783903Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:45.784122635Z {"level":"info","ts":"2026-03-13T10:37:45.784055Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, IDLE"} 2026-03-13T10:37:45.784230429Z {"level":"info","ts":"2026-03-13T10:37:45.784113Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T10:37:45.784230429Z {"level":"info","ts":"2026-03-13T10:37:45.784163Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T10:37:45.784420414Z {"level":"info","ts":"2026-03-13T10:37:45.784297Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, CONNECTING"} 2026-03-13T10:37:45.784799596Z {"level":"info","ts":"2026-03-13T10:37:45.784696Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:45.784799596Z {"level":"warn","ts":"2026-03-13T10:37:45.784773Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:45.784849778Z {"level":"info","ts":"2026-03-13T10:37:45.784829Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:45.784912989Z {"level":"info","ts":"2026-03-13T10:37:45.784871Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, TRANSIENT_FAILURE"} 2026-03-13T10:37:47.685113120Z {"level":"info","ts":"2026-03-13T10:37:47.684970Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:47.685113120Z {"level":"info","ts":"2026-03-13T10:37:47.685037Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, IDLE"} 2026-03-13T10:37:47.685113120Z {"level":"info","ts":"2026-03-13T10:37:47.685077Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T10:37:47.685113120Z {"level":"info","ts":"2026-03-13T10:37:47.685102Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T10:37:47.685229014Z {"level":"info","ts":"2026-03-13T10:37:47.685205Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, CONNECTING"} 2026-03-13T10:37:47.685515492Z {"level":"info","ts":"2026-03-13T10:37:47.685452Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:47.685515492Z {"level":"warn","ts":"2026-03-13T10:37:47.685475Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:47.685515492Z {"level":"info","ts":"2026-03-13T10:37:47.685493Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:47.685567914Z {"level":"info","ts":"2026-03-13T10:37:47.685511Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, TRANSIENT_FAILURE"} 2026-03-13T10:37:50.478514245Z {"level":"info","ts":"2026-03-13T10:37:50.478363Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:50.478514245Z {"level":"info","ts":"2026-03-13T10:37:50.478467Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, IDLE"} 2026-03-13T10:37:50.478661300Z {"level":"info","ts":"2026-03-13T10:37:50.478504Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T10:37:50.478661300Z {"level":"info","ts":"2026-03-13T10:37:50.478541Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T10:37:50.478777433Z {"level":"info","ts":"2026-03-13T10:37:50.478703Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, CONNECTING"} 2026-03-13T10:37:50.479059842Z {"level":"info","ts":"2026-03-13T10:37:50.478990Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:50.479059842Z {"level":"warn","ts":"2026-03-13T10:37:50.479029Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:50.479270618Z {"level":"info","ts":"2026-03-13T10:37:50.479139Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:50.479270618Z {"level":"info","ts":"2026-03-13T10:37:50.479180Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, TRANSIENT_FAILURE"} 2026-03-13T10:37:54.700634159Z {"level":"info","ts":"2026-03-13T10:37:54.700485Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:54.700634159Z {"level":"info","ts":"2026-03-13T10:37:54.700558Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, IDLE"} 2026-03-13T10:37:54.700705081Z {"level":"info","ts":"2026-03-13T10:37:54.700619Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T10:37:54.700705081Z {"level":"info","ts":"2026-03-13T10:37:54.700652Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T10:37:54.700865866Z {"level":"info","ts":"2026-03-13T10:37:54.700779Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, CONNECTING"} 2026-03-13T10:37:54.701161915Z {"level":"info","ts":"2026-03-13T10:37:54.701080Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:54.701161915Z {"level":"warn","ts":"2026-03-13T10:37:54.701139Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:54.701242147Z {"level":"info","ts":"2026-03-13T10:37:54.701186Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:37:54.701283229Z {"level":"info","ts":"2026-03-13T10:37:54.701253Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, TRANSIENT_FAILURE"} 2026-03-13T10:38:01.700809513Z {"level":"info","ts":"2026-03-13T10:38:01.700696Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:38:01.700809513Z {"level":"info","ts":"2026-03-13T10:38:01.700780Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, IDLE"} 2026-03-13T10:38:01.700843304Z {"level":"info","ts":"2026-03-13T10:38:01.700817Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T10:38:01.700864055Z {"level":"info","ts":"2026-03-13T10:38:01.700850Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T10:38:01.701072001Z {"level":"info","ts":"2026-03-13T10:38:01.700990Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, CONNECTING"} 2026-03-13T10:38:01.701189314Z {"level":"info","ts":"2026-03-13T10:38:01.701158Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:38:01.701197255Z {"level":"warn","ts":"2026-03-13T10:38:01.701185Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:38:01.701223875Z {"level":"info","ts":"2026-03-13T10:38:01.701208Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:38:01.701249716Z {"level":"info","ts":"2026-03-13T10:38:01.701237Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, TRANSIENT_FAILURE"} 2026-03-13T10:38:13.166705339Z {"level":"info","ts":"2026-03-13T10:38:13.166507Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:38:13.166705339Z {"level":"info","ts":"2026-03-13T10:38:13.166630Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, IDLE"} 2026-03-13T10:38:13.166787352Z {"level":"info","ts":"2026-03-13T10:38:13.166680Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T10:38:13.166787352Z {"level":"info","ts":"2026-03-13T10:38:13.166725Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T10:38:13.166880545Z {"level":"info","ts":"2026-03-13T10:38:13.166830Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, CONNECTING"} 2026-03-13T10:38:13.167319568Z {"level":"info","ts":"2026-03-13T10:38:13.167223Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:38:13.167319568Z {"level":"warn","ts":"2026-03-13T10:38:13.167294Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:38:13.167356469Z {"level":"info","ts":"2026-03-13T10:38:13.167333Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:38:13.167426741Z {"level":"info","ts":"2026-03-13T10:38:13.167377Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, TRANSIENT_FAILURE"} 2026-03-13T10:38:31.907889390Z {"level":"info","ts":"2026-03-13T10:38:31.907728Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T10:38:31.907889390Z {"level":"info","ts":"2026-03-13T10:38:31.907836Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, IDLE"} 2026-03-13T10:38:31.907972863Z {"level":"info","ts":"2026-03-13T10:38:31.907880Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T10:38:31.907972863Z {"level":"info","ts":"2026-03-13T10:38:31.907923Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T10:38:31.908267642Z {"level":"info","ts":"2026-03-13T10:38:31.908084Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, CONNECTING"} 2026-03-13T10:38:31.915493271Z {"level":"info","ts":"2026-03-13T10:38:31.915389Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2026-03-13T10:38:31.915493271Z {"level":"info","ts":"2026-03-13T10:38:31.915437Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00018b500, READY"} 2026-03-13T10:38:31.915548303Z {"level":"info","ts":"2026-03-13T10:38:31.915511Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2026-03-13T10:38:31.915563303Z {"level":"info","ts":"2026-03-13T10:38:31.915543Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000013035115154764724022722 0ustar00000000000000002026-03-13T10:40:20.110263100Z {"level":"warn","ts":"2026-03-13T10:40:20.110210Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.395055Z","time spent":"1.715150186s","remote":"[::1]:39372","response type":"/etcdserverpb.KV/Range","request count":0,"request size":132,"response count":1,"response size":2153,"request content":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-cluster-csi-drivers\" "} 2026-03-13T10:40:20.110263100Z {"level":"warn","ts":"2026-03-13T10:40:20.109812Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:19.383194Z","time spent":"726.605043ms","remote":"[::1]:54738","response type":"/etcdserverpb.KV/Range","request count":0,"request size":90,"response count":1,"response size":31,"request content":"key:\"/kubernetes.io/config.openshift.io/images/\" range_end:\"/kubernetes.io/config.openshift.io/images0\" count_only:true "} 2026-03-13T10:40:20.110293351Z {"level":"warn","ts":"2026-03-13T10:40:20.110279Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.708245773s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/infrastructures/cluster\" ","response":"range_response_count:1 size:1393"} 2026-03-13T10:40:20.110307831Z {"level":"warn","ts":"2026-03-13T10:40:20.110285Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.701985868s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-controller-manager/openshift-controller-manager\" ","response":"range_response_count:1 size:1963"} 2026-03-13T10:40:20.110318021Z {"level":"info","ts":"2026-03-13T10:40:20.110299Z","caller":"traceutil/trace.go:171","msg":"trace[740412990] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/infrastructures/cluster; range_end:; response_count:1; response_revision:10226; }","duration":"1.708275025s","start":"2026-03-13T10:40:18.402018Z","end":"2026-03-13T10:40:20.110293Z","steps":["trace[740412990] 'agreement among raft nodes before linearized reading' (duration: 1.708228403s)"],"step_count":1} 2026-03-13T10:40:20.110328342Z {"level":"warn","ts":"2026-03-13T10:40:20.110316Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.402013Z","time spent":"1.708298585s","remote":"[::1]:54872","response type":"/etcdserverpb.KV/Range","request count":0,"request size":60,"response count":1,"response size":1417,"request content":"key:\"/kubernetes.io/config.openshift.io/infrastructures/cluster\" "} 2026-03-13T10:40:20.110339292Z {"level":"info","ts":"2026-03-13T10:40:20.110313Z","caller":"traceutil/trace.go:171","msg":"trace[1567522421] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-controller-manager/openshift-controller-manager; range_end:; response_count:1; response_revision:10226; }","duration":"1.702024549s","start":"2026-03-13T10:40:18.408278Z","end":"2026-03-13T10:40:20.110303Z","steps":["trace[1567522421] 'agreement among raft nodes before linearized reading' (duration: 1.701967457s)"],"step_count":1} 2026-03-13T10:40:20.110339292Z {"level":"warn","ts":"2026-03-13T10:40:20.108725Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.383250Z","time spent":"1.725471508s","remote":"[::1]:55092","response type":"/etcdserverpb.KV/Range","request count":0,"request size":94,"response count":1,"response size":4142,"request content":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-kube-apiserver/kube-apiserver\" "} 2026-03-13T10:40:20.111243016Z {"level":"warn","ts":"2026-03-13T10:40:20.110344Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.408271Z","time spent":"1.70206607s","remote":"[::1]:55092","response type":"/etcdserverpb.KV/Range","request count":0,"request size":112,"response count":1,"response size":1987,"request content":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-controller-manager/openshift-controller-manager\" "} 2026-03-13T10:40:20.111243016Z {"level":"warn","ts":"2026-03-13T10:40:20.108802Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"877.117555ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/tuned.openshift.io/tuneds/\" range_end:\"/kubernetes.io/tuned.openshift.io/tuneds0\" count_only:true ","response":"range_response_count:0 size:7"} 2026-03-13T10:40:20.111243016Z {"level":"warn","ts":"2026-03-13T10:40:20.110229Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.408320Z","time spent":"1.701901806s","remote":"[::1]:39244","response type":"/etcdserverpb.KV/Range","request count":0,"request size":64,"response count":1,"response size":1089,"request content":"key:\"/kubernetes.io/roles/openshift-config-managed/machine-approver\" "} 2026-03-13T10:40:20.111243016Z {"level":"info","ts":"2026-03-13T10:40:20.110423Z","caller":"traceutil/trace.go:171","msg":"trace[908874048] range","detail":"{range_begin:/kubernetes.io/tuned.openshift.io/tuneds/; range_end:/kubernetes.io/tuned.openshift.io/tuneds0; response_count:0; response_revision:10226; }","duration":"878.76989ms","start":"2026-03-13T10:40:19.231645Z","end":"2026-03-13T10:40:20.110415Z","steps":["trace[908874048] 'agreement among raft nodes before linearized reading' (duration: 877.124866ms)"],"step_count":1} 2026-03-13T10:40:20.111243016Z {"level":"warn","ts":"2026-03-13T10:40:20.110433Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.704270028s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/hardwaredata.metal3.io\" ","response":"range_response_count:1 size:8029"} 2026-03-13T10:40:20.111243016Z {"level":"warn","ts":"2026-03-13T10:40:20.110666Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:19.231626Z","time spent":"879.030076ms","remote":"[::1]:54860","response type":"/etcdserverpb.KV/Range","request count":0,"request size":88,"response count":1,"response size":31,"request content":"key:\"/kubernetes.io/tuned.openshift.io/tuneds/\" range_end:\"/kubernetes.io/tuned.openshift.io/tuneds0\" count_only:true "} 2026-03-13T10:40:20.111243016Z {"level":"info","ts":"2026-03-13T10:40:20.110674Z","caller":"traceutil/trace.go:171","msg":"trace[1213830040] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/hardwaredata.metal3.io; range_end:; response_count:1; response_revision:10226; }","duration":"1.704516635s","start":"2026-03-13T10:40:18.406150Z","end":"2026-03-13T10:40:20.110666Z","steps":["trace[1213830040] 'agreement among raft nodes before linearized reading' (duration: 1.704249847s)"],"step_count":1} 2026-03-13T10:40:20.111243016Z {"level":"warn","ts":"2026-03-13T10:40:20.110673Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.702446671s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/namespaces/openshift-operators\" ","response":"range_response_count:1 size:1794"} 2026-03-13T10:40:20.111243016Z {"level":"warn","ts":"2026-03-13T10:40:20.110696Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.406146Z","time spent":"1.704544835s","remote":"[::1]:54350","response type":"/etcdserverpb.KV/Range","request count":0,"request size":86,"response count":1,"response size":8053,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/hardwaredata.metal3.io\" "} 2026-03-13T10:40:20.111243016Z {"level":"warn","ts":"2026-03-13T10:40:20.110661Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.702336557s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-image-registry-ibmcos\" ","response":"range_response_count:1 size:2943"} 2026-03-13T10:40:20.111243016Z {"level":"info","ts":"2026-03-13T10:40:20.110714Z","caller":"traceutil/trace.go:171","msg":"trace[1794766183] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-operators; range_end:; response_count:1; response_revision:10226; }","duration":"1.702495252s","start":"2026-03-13T10:40:18.408207Z","end":"2026-03-13T10:40:20.110703Z","steps":["trace[1794766183] 'agreement among raft nodes before linearized reading' (duration: 1.702183303s)"],"step_count":1} 2026-03-13T10:40:20.111243016Z {"level":"warn","ts":"2026-03-13T10:40:20.110727Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.709030304s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterrolebindings/cluster-samples-operator-imageconfig-reader\" ","response":"range_response_count:1 size:1118"} 2026-03-13T10:40:20.111243016Z {"level":"info","ts":"2026-03-13T10:40:20.108936Z","caller":"traceutil/trace.go:171","msg":"trace[641311286] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-cluster-storage-operator/csi-snapshot-controller; range_end:; response_count:1; response_revision:10226; }","duration":"1.733769768s","start":"2026-03-13T10:40:18.375162Z","end":"2026-03-13T10:40:20.108931Z","steps":["trace[641311286] 'agreement among raft nodes before linearized reading' (duration: 1.733735277s)"],"step_count":1} 2026-03-13T10:40:20.111243016Z {"level":"info","ts":"2026-03-13T10:40:20.110752Z","caller":"traceutil/trace.go:171","msg":"trace[1663126332] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-image-registry-ibmcos; range_end:; response_count:1; response_revision:10226; }","duration":"1.702660555s","start":"2026-03-13T10:40:18.408070Z","end":"2026-03-13T10:40:20.110731Z","steps":["trace[1663126332] 'agreement among raft nodes before linearized reading' (duration: 1.702243604s)"],"step_count":1} 2026-03-13T10:40:20.111243016Z {"level":"warn","ts":"2026-03-13T10:40:20.110783Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.375157Z","time spent":"1.735616047s","remote":"[::1]:55056","response type":"/etcdserverpb.KV/Range","request count":0,"request size":87,"response count":1,"response size":3737,"request content":"key:\"/kubernetes.io/deployments/openshift-cluster-storage-operator/csi-snapshot-controller\" "} 2026-03-13T10:40:20.111243016Z {"level":"warn","ts":"2026-03-13T10:40:20.110800Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.408061Z","time spent":"1.702732388s","remote":"[::1]:39372","response type":"/etcdserverpb.KV/Range","request count":0,"request size":134,"response count":1,"response size":2967,"request content":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-image-registry-ibmcos\" "} 2026-03-13T10:40:20.111243016Z {"level":"info","ts":"2026-03-13T10:40:20.108860Z","caller":"traceutil/trace.go:171","msg":"trace[1028684553] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-cloud-network-config-controller-openstack; range_end:; response_count:1; response_revision:10226; }","duration":"1.729937867s","start":"2026-03-13T10:40:18.378915Z","end":"2026-03-13T10:40:20.108853Z","steps":["trace[1028684553] 'agreement among raft nodes before linearized reading' (duration: 1.729899846s)"],"step_count":1} 2026-03-13T10:40:20.111243016Z {"level":"warn","ts":"2026-03-13T10:40:20.110837Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.70469766s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/dnses.config.openshift.io\" ","response":"range_response_count:1 size:8497"} 2026-03-13T10:40:20.111243016Z {"level":"info","ts":"2026-03-13T10:40:20.110860Z","caller":"traceutil/trace.go:171","msg":"trace[1513878069] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/dnses.config.openshift.io; range_end:; response_count:1; response_revision:10226; }","duration":"1.704741961s","start":"2026-03-13T10:40:18.406112Z","end":"2026-03-13T10:40:20.110854Z","steps":["trace[1513878069] 'agreement among raft nodes before linearized reading' (duration: 1.70470434s)"],"step_count":1} 2026-03-13T10:40:20.111338099Z {"level":"warn","ts":"2026-03-13T10:40:20.108888Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.73005398s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-network-operator/cluster-network-operator\" ","response":"range_response_count:1 size:1397"} 2026-03-13T10:40:20.111338099Z {"level":"warn","ts":"2026-03-13T10:40:20.110877Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.406094Z","time spent":"1.704778922s","remote":"[::1]:54350","response type":"/etcdserverpb.KV/Range","request count":0,"request size":89,"response count":1,"response size":8521,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/dnses.config.openshift.io\" "} 2026-03-13T10:40:20.111338099Z {"level":"warn","ts":"2026-03-13T10:40:20.110883Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.702611474s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/configmaps/openshift-authentication-operator/service-ca-bundle\" ","response":"range_response_count:1 size:2645"} 2026-03-13T10:40:20.111338099Z {"level":"warn","ts":"2026-03-13T10:40:20.108966Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.734660502s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/namespaces/openshift-marketplace\" ","response":"range_response_count:1 size:2512"} 2026-03-13T10:40:20.111338099Z {"level":"info","ts":"2026-03-13T10:40:20.110915Z","caller":"traceutil/trace.go:171","msg":"trace[1678462270] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-authentication-operator/service-ca-bundle; range_end:; response_count:1; response_revision:10226; }","duration":"1.702641085s","start":"2026-03-13T10:40:18.408264Z","end":"2026-03-13T10:40:20.110905Z","steps":["trace[1678462270] 'agreement among raft nodes before linearized reading' (duration: 1.702583503s)"],"step_count":1} 2026-03-13T10:40:20.111338099Z {"level":"warn","ts":"2026-03-13T10:40:20.109121Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:17.979000Z","time spent":"2.130107252s","remote":"[::1]:54648","response type":"/etcdserverpb.KV/Range","request count":0,"request size":65,"response count":1,"response size":568,"request content":"key:\"/kubernetes.io/leases/openshift-catalogd/catalogd-operator-lock\" "} 2026-03-13T10:40:20.111338099Z {"level":"info","ts":"2026-03-13T10:40:20.110934Z","caller":"traceutil/trace.go:171","msg":"trace[1036564765] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-marketplace; range_end:; response_count:1; response_revision:10226; }","duration":"1.736630745s","start":"2026-03-13T10:40:18.374295Z","end":"2026-03-13T10:40:20.110926Z","steps":["trace[1036564765] 'agreement among raft nodes before linearized reading' (duration: 1.734648161s)"],"step_count":1} 2026-03-13T10:40:20.111338099Z {"level":"warn","ts":"2026-03-13T10:40:20.110948Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.408245Z","time spent":"1.702693587s","remote":"[::1]:54598","response type":"/etcdserverpb.KV/Range","request count":0,"request size":79,"response count":1,"response size":2669,"request content":"key:\"/kubernetes.io/configmaps/openshift-authentication-operator/service-ca-bundle\" "} 2026-03-13T10:40:20.111338099Z {"level":"warn","ts":"2026-03-13T10:40:20.110962Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.374292Z","time spent":"1.736663355s","remote":"[::1]:54952","response type":"/etcdserverpb.KV/Range","request count":0,"request size":49,"response count":1,"response size":2536,"request content":"key:\"/kubernetes.io/namespaces/openshift-marketplace\" "} 2026-03-13T10:40:20.111338099Z {"level":"warn","ts":"2026-03-13T10:40:20.110976Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.705046639s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-config-managed/cloud-credential-operator\" ","response":"range_response_count:1 size:1097"} 2026-03-13T10:40:20.111338099Z {"level":"info","ts":"2026-03-13T10:40:20.110993Z","caller":"traceutil/trace.go:171","msg":"trace[1386040065] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-config-managed/cloud-credential-operator; range_end:; response_count:1; response_revision:10226; }","duration":"1.705061579s","start":"2026-03-13T10:40:18.405925Z","end":"2026-03-13T10:40:20.110987Z","steps":["trace[1386040065] 'agreement among raft nodes before linearized reading' (duration: 1.705027768s)"],"step_count":1} 2026-03-13T10:40:20.111338099Z {"level":"warn","ts":"2026-03-13T10:40:20.111009Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.702867432s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/podmonitors.monitoring.coreos.com\" ","response":"range_response_count:1 size:36012"} 2026-03-13T10:40:20.111338099Z {"level":"warn","ts":"2026-03-13T10:40:20.111013Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.405908Z","time spent":"1.705099241s","remote":"[::1]:54338","response type":"/etcdserverpb.KV/Range","request count":0,"request size":80,"response count":1,"response size":1121,"request content":"key:\"/kubernetes.io/rolebindings/openshift-config-managed/cloud-credential-operator\" "} 2026-03-13T10:40:20.111338099Z {"level":"info","ts":"2026-03-13T10:40:20.111029Z","caller":"traceutil/trace.go:171","msg":"trace[1561810337] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/podmonitors.monitoring.coreos.com; range_end:; response_count:1; response_revision:10226; }","duration":"1.702905582s","start":"2026-03-13T10:40:18.408117Z","end":"2026-03-13T10:40:20.111022Z","steps":["trace[1561810337] 'agreement among raft nodes before linearized reading' (duration: 1.70284241s)"],"step_count":1} 2026-03-13T10:40:20.111338099Z {"level":"warn","ts":"2026-03-13T10:40:20.109163Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.738874013s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/mutatingwebhookconfigurations\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-13T10:40:20.111338099Z {"level":"warn","ts":"2026-03-13T10:40:20.111046Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.408105Z","time spent":"1.702937334s","remote":"[::1]:54350","response type":"/etcdserverpb.KV/Range","request count":0,"request size":97,"response count":1,"response size":36036,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/podmonitors.monitoring.coreos.com\" "} 2026-03-13T10:40:20.111338099Z {"level":"warn","ts":"2026-03-13T10:40:20.109916Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.701520425s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/configmaps/openshift-controller-manager-operator/openshift-controller-manager-images\" ","response":"range_response_count:1 size:1368"} 2026-03-13T10:40:20.111338099Z {"level":"info","ts":"2026-03-13T10:40:20.111066Z","caller":"traceutil/trace.go:171","msg":"trace[1813128087] range","detail":"{range_begin:/kubernetes.io/mutatingwebhookconfigurations; range_end:; response_count:0; response_revision:10226; }","duration":"1.740807315s","start":"2026-03-13T10:40:18.370247Z","end":"2026-03-13T10:40:20.111054Z","steps":["trace[1813128087] 'agreement among raft nodes before linearized reading' (duration: 1.738893544s)"],"step_count":1} 2026-03-13T10:40:20.111338099Z {"level":"warn","ts":"2026-03-13T10:40:20.110187Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.394904Z","time spent":"1.71527531s","remote":"[::1]:54598","response type":"/etcdserverpb.KV/Range","request count":0,"request size":65,"response count":1,"response size":96549,"request content":"key:\"/kubernetes.io/configmaps/openshift-config-managed/node-cluster\" "} 2026-03-13T10:40:20.111338099Z {"level":"warn","ts":"2026-03-13T10:40:20.111107Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.370229Z","time spent":"1.740864907s","remote":"[::1]:46694","response type":"/etcdserverpb.KV/Range","request count":0,"request size":48,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/mutatingwebhookconfigurations\" limit:1 "} 2026-03-13T10:40:20.111395230Z {"level":"warn","ts":"2026-03-13T10:40:20.111130Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.707246037s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/configmaps/openshift-cluster-node-tuning-operator/trusted-ca\" ","response":"range_response_count:1 size:225303"} 2026-03-13T10:40:20.111395230Z {"level":"info","ts":"2026-03-13T10:40:20.111151Z","caller":"traceutil/trace.go:171","msg":"trace[1407896103] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-cluster-node-tuning-operator/trusted-ca; range_end:; response_count:1; response_revision:10226; }","duration":"1.707274658s","start":"2026-03-13T10:40:18.403869Z","end":"2026-03-13T10:40:20.111144Z","steps":["trace[1407896103] 'agreement among raft nodes before linearized reading' (duration: 1.707192356s)"],"step_count":1} 2026-03-13T10:40:20.111395230Z {"level":"warn","ts":"2026-03-13T10:40:20.111169Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.403863Z","time spent":"1.707301209s","remote":"[::1]:54598","response type":"/etcdserverpb.KV/Range","request count":0,"request size":77,"response count":1,"response size":225327,"request content":"key:\"/kubernetes.io/configmaps/openshift-cluster-node-tuning-operator/trusted-ca\" "} 2026-03-13T10:40:20.111395230Z {"level":"warn","ts":"2026-03-13T10:40:20.111175Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.702945283s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-cluster-storage-operator/csi-snapshot-controller-operator\" ","response":"range_response_count:1 size:1710"} 2026-03-13T10:40:20.111395230Z {"level":"info","ts":"2026-03-13T10:40:20.111214Z","caller":"traceutil/trace.go:171","msg":"trace[750617543] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-cluster-storage-operator/csi-snapshot-controller-operator; range_end:; response_count:1; response_revision:10226; }","duration":"1.702989835s","start":"2026-03-13T10:40:18.408211Z","end":"2026-03-13T10:40:20.111201Z","steps":["trace[750617543] 'agreement among raft nodes before linearized reading' (duration: 1.702921523s)"],"step_count":1} 2026-03-13T10:40:20.111395230Z {"level":"warn","ts":"2026-03-13T10:40:20.110212Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.380888Z","time spent":"1.72927162s","remote":"[::1]:39258","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":6476,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} 2026-03-13T10:40:20.111395230Z {"level":"warn","ts":"2026-03-13T10:40:20.111241Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.408202Z","time spent":"1.703032706s","remote":"[::1]:54458","response type":"/etcdserverpb.KV/Range","request count":0,"request size":100,"response count":1,"response size":1734,"request content":"key:\"/kubernetes.io/serviceaccounts/openshift-cluster-storage-operator/csi-snapshot-controller-operator\" "} 2026-03-13T10:40:20.111395230Z {"level":"warn","ts":"2026-03-13T10:40:20.111247Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.703123619s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-machine-api/cluster-autoscaler-operator\" ","response":"range_response_count:1 size:1209"} 2026-03-13T10:40:20.111395230Z {"level":"info","ts":"2026-03-13T10:40:20.111280Z","caller":"traceutil/trace.go:171","msg":"trace[1761440653] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-machine-api/cluster-autoscaler-operator; range_end:; response_count:1; response_revision:10226; }","duration":"1.70318159s","start":"2026-03-13T10:40:18.408087Z","end":"2026-03-13T10:40:20.111269Z","steps":["trace[1761440653] 'agreement among raft nodes before linearized reading' (duration: 1.703106128s)"],"step_count":1} 2026-03-13T10:40:20.111395230Z {"level":"warn","ts":"2026-03-13T10:40:20.111291Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.707957946s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-kube-scheduler/prometheus-k8s\" ","response":"range_response_count:1 size:864"} 2026-03-13T10:40:20.111395230Z {"level":"warn","ts":"2026-03-13T10:40:20.111312Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.408081Z","time spent":"1.703213541s","remote":"[::1]:54338","response type":"/etcdserverpb.KV/Range","request count":0,"request size":79,"response count":1,"response size":1233,"request content":"key:\"/kubernetes.io/rolebindings/openshift-machine-api/cluster-autoscaler-operator\" "} 2026-03-13T10:40:20.111395230Z {"level":"warn","ts":"2026-03-13T10:40:20.110828Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.702531553s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/configmaps/openshift-config-managed/dashboard-k8s-resources-cluster\" ","response":"range_response_count:1 size:112259"} 2026-03-13T10:40:20.111395230Z {"level":"info","ts":"2026-03-13T10:40:20.111320Z","caller":"traceutil/trace.go:171","msg":"trace[1147830112] range","detail":"{range_begin:/kubernetes.io/roles/openshift-kube-scheduler/prometheus-k8s; range_end:; response_count:1; response_revision:10226; }","duration":"1.707994257s","start":"2026-03-13T10:40:18.403318Z","end":"2026-03-13T10:40:20.111312Z","steps":["trace[1147830112] 'agreement among raft nodes before linearized reading' (duration: 1.707936985s)"],"step_count":1} 2026-03-13T10:40:20.111395230Z {"level":"warn","ts":"2026-03-13T10:40:20.108383Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.718913145s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterrolebindings/system:openshift:operator:kube-controller-manager-operator\" ","response":"range_response_count:1 size:1261"} 2026-03-13T10:40:20.111395230Z {"level":"info","ts":"2026-03-13T10:40:20.111339Z","caller":"traceutil/trace.go:171","msg":"trace[817107253] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-config-managed/dashboard-k8s-resources-cluster; range_end:; response_count:1; response_revision:10226; }","duration":"1.703048436s","start":"2026-03-13T10:40:18.408282Z","end":"2026-03-13T10:40:20.111331Z","steps":["trace[817107253] 'agreement among raft nodes before linearized reading' (duration: 1.702480451s)"],"step_count":1} 2026-03-13T10:40:20.111395230Z {"level":"warn","ts":"2026-03-13T10:40:20.111343Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.403314Z","time spent":"1.708023948s","remote":"[::1]:39244","response type":"/etcdserverpb.KV/Range","request count":0,"request size":62,"response count":1,"response size":888,"request content":"key:\"/kubernetes.io/roles/openshift-kube-scheduler/prometheus-k8s\" "} 2026-03-13T10:40:20.111395230Z {"level":"warn","ts":"2026-03-13T10:40:20.108924Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.362886Z","time spent":"1.746037363s","remote":"[::1]:54752","response type":"/etcdserverpb.Lease/LeaseGrant","request count":-1,"request size":-1,"response count":-1,"response size":-1,"request content":""} 2026-03-13T10:40:20.111395230Z {"level":"warn","ts":"2026-03-13T10:40:20.111361Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.408277Z","time spent":"1.703077947s","remote":"[::1]:54598","response type":"/etcdserverpb.KV/Range","request count":0,"request size":84,"response count":1,"response size":112283,"request content":"key:\"/kubernetes.io/configmaps/openshift-config-managed/dashboard-k8s-resources-cluster\" "} 2026-03-13T10:40:20.111395230Z {"level":"info","ts":"2026-03-13T10:40:20.111358Z","caller":"traceutil/trace.go:171","msg":"trace[360207323] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/system:openshift:operator:kube-controller-manager-operator; range_end:; response_count:1; response_revision:10226; }","duration":"1.721894155s","start":"2026-03-13T10:40:18.389452Z","end":"2026-03-13T10:40:20.111346Z","steps":["trace[360207323] 'agreement among raft nodes before linearized reading' (duration: 1.718876824s)"],"step_count":1} 2026-03-13T10:40:20.111424461Z {"level":"warn","ts":"2026-03-13T10:40:20.111398Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.389446Z","time spent":"1.721937646s","remote":"[::1]:54488","response type":"/etcdserverpb.KV/Range","request count":0,"request size":95,"response count":1,"response size":1285,"request content":"key:\"/kubernetes.io/clusterrolebindings/system:openshift:operator:kube-controller-manager-operator\" "} 2026-03-13T10:40:20.111482083Z {"level":"info","ts":"2026-03-13T10:40:20.110887Z","caller":"traceutil/trace.go:171","msg":"trace[2023446806] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-network-operator/cluster-network-operator; range_end:; response_count:1; response_revision:10226; }","duration":"1.732060073s","start":"2026-03-13T10:40:18.378817Z","end":"2026-03-13T10:40:20.110877Z","steps":["trace[2023446806] 'agreement among raft nodes before linearized reading' (duration: 1.730051189s)"],"step_count":1} 2026-03-13T10:40:20.111482083Z {"level":"warn","ts":"2026-03-13T10:40:20.110853Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.378904Z","time spent":"1.73193452s","remote":"[::1]:39372","response type":"/etcdserverpb.KV/Range","request count":0,"request size":154,"response count":1,"response size":2386,"request content":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-cloud-network-config-controller-openstack\" "} 2026-03-13T10:40:20.111482083Z {"level":"warn","ts":"2026-03-13T10:40:20.111465Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.378809Z","time spent":"1.732647259s","remote":"[::1]:54458","response type":"/etcdserverpb.KV/Range","request count":0,"request size":84,"response count":1,"response size":1421,"request content":"key:\"/kubernetes.io/serviceaccounts/openshift-network-operator/cluster-network-operator\" "} 2026-03-13T10:40:20.111561925Z {"level":"warn","ts":"2026-03-13T10:40:20.111486Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.708405199s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/services/specs/openshift-cluster-olm-operator/cluster-olm-operator-metrics\" ","response":"range_response_count:1 size:1705"} 2026-03-13T10:40:20.111561925Z {"level":"info","ts":"2026-03-13T10:40:20.111514Z","caller":"traceutil/trace.go:171","msg":"trace[1103577568] range","detail":"{range_begin:/kubernetes.io/services/specs/openshift-cluster-olm-operator/cluster-olm-operator-metrics; range_end:; response_count:1; response_revision:10226; }","duration":"1.708442329s","start":"2026-03-13T10:40:18.403065Z","end":"2026-03-13T10:40:20.111507Z","steps":["trace[1103577568] 'agreement among raft nodes before linearized reading' (duration: 1.708384058s)"],"step_count":1} 2026-03-13T10:40:20.111561925Z {"level":"warn","ts":"2026-03-13T10:40:20.110211Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.391039Z","time spent":"1.719167172s","remote":"[::1]:39324","response type":"/etcdserverpb.KV/Range","request count":0,"request size":55,"response count":1,"response size":1312,"request content":"key:\"/kubernetes.io/clusterroles/operatorhub-config-reader\" "} 2026-03-13T10:40:20.111580155Z {"level":"warn","ts":"2026-03-13T10:40:20.111183Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.703049086s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/services/specs/openshift-apiserver/check-endpoints\" ","response":"range_response_count:1 size:1425"} 2026-03-13T10:40:20.111626356Z {"level":"info","ts":"2026-03-13T10:40:20.111558Z","caller":"traceutil/trace.go:171","msg":"trace[1163656970] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/system:openshift:operator:openshift-apiserver-operator; range_end:; response_count:1; response_revision:10226; }","duration":"1.70319572s","start":"2026-03-13T10:40:18.408352Z","end":"2026-03-13T10:40:20.111547Z","steps":["trace[1163656970] 'agreement among raft nodes before linearized reading' (duration: 1.701584087s)"],"step_count":1} 2026-03-13T10:40:20.113044115Z {"level":"info","ts":"2026-03-13T10:40:20.110130Z","caller":"traceutil/trace.go:171","msg":"trace[571906874] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-service-ca-operator/service-ca-operator-config; range_end:; response_count:1; response_revision:10226; }","duration":"1.715017973s","start":"2026-03-13T10:40:18.395102Z","end":"2026-03-13T10:40:20.110120Z","steps":["trace[571906874] 'agreement among raft nodes before linearized reading' (duration: 1.714967422s)"],"step_count":1} 2026-03-13T10:40:20.113044115Z {"level":"warn","ts":"2026-03-13T10:40:20.113016Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.395098Z","time spent":"1.717908981s","remote":"[::1]:54598","response type":"/etcdserverpb.KV/Range","request count":0,"request size":84,"response count":1,"response size":1167,"request content":"key:\"/kubernetes.io/configmaps/openshift-service-ca-operator/service-ca-operator-config\" "} 2026-03-13T10:40:20.113789185Z {"level":"info","ts":"2026-03-13T10:40:20.110761Z","caller":"traceutil/trace.go:171","msg":"trace[451818769] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/cluster-samples-operator-imageconfig-reader; range_end:; response_count:1; response_revision:10226; }","duration":"1.709072466s","start":"2026-03-13T10:40:18.401679Z","end":"2026-03-13T10:40:20.110751Z","steps":["trace[451818769] 'agreement among raft nodes before linearized reading' (duration: 1.709005294s)"],"step_count":1} 2026-03-13T10:40:20.113789185Z {"level":"warn","ts":"2026-03-13T10:40:20.113760Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.401672Z","time spent":"1.712068626s","remote":"[::1]:54488","response type":"/etcdserverpb.KV/Range","request count":0,"request size":80,"response count":1,"response size":1142,"request content":"key:\"/kubernetes.io/clusterrolebindings/cluster-samples-operator-imageconfig-reader\" "} 2026-03-13T10:40:20.114290628Z {"level":"info","ts":"2026-03-13T10:40:20.111074Z","caller":"traceutil/trace.go:171","msg":"trace[171238521] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-controller-manager-operator/openshift-controller-manager-images; range_end:; response_count:1; response_revision:10226; }","duration":"1.702680206s","start":"2026-03-13T10:40:18.408386Z","end":"2026-03-13T10:40:20.111066Z","steps":["trace[171238521] 'agreement among raft nodes before linearized reading' (duration: 1.701447563s)"],"step_count":1} 2026-03-13T10:40:20.114367890Z {"level":"warn","ts":"2026-03-13T10:40:20.114290Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.408380Z","time spent":"1.705885743s","remote":"[::1]:54598","response type":"/etcdserverpb.KV/Range","request count":0,"request size":101,"response count":1,"response size":1392,"request content":"key:\"/kubernetes.io/configmaps/openshift-controller-manager-operator/openshift-controller-manager-images\" "} 2026-03-13T10:40:20.114542195Z {"level":"warn","ts":"2026-03-13T10:40:20.110319Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.715245158s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-dns-operator/dns-operator\" ","response":"range_response_count:1 size:1056"} 2026-03-13T10:40:20.114556725Z {"level":"info","ts":"2026-03-13T10:40:20.114530Z","caller":"traceutil/trace.go:171","msg":"trace[1844055764] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-dns-operator/dns-operator; range_end:; response_count:1; response_revision:10226; }","duration":"1.719456822s","start":"2026-03-13T10:40:18.395058Z","end":"2026-03-13T10:40:20.114515Z","steps":["trace[1844055764] 'agreement among raft nodes before linearized reading' (duration: 1.715232809s)"],"step_count":1} 2026-03-13T10:40:20.114697859Z {"level":"warn","ts":"2026-03-13T10:40:20.114570Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.395054Z","time spent":"1.719505603s","remote":"[::1]:54338","response type":"/etcdserverpb.KV/Range","request count":0,"request size":65,"response count":1,"response size":1080,"request content":"key:\"/kubernetes.io/rolebindings/openshift-dns-operator/dns-operator\" "} 2026-03-13T10:40:20.115442939Z {"level":"warn","ts":"2026-03-13T10:40:20.110745Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.408203Z","time spent":"1.702535283s","remote":"[::1]:54952","response type":"/etcdserverpb.KV/Range","request count":0,"request size":47,"response count":1,"response size":1818,"request content":"key:\"/kubernetes.io/namespaces/openshift-operators\" "} 2026-03-13T10:40:20.115466190Z {"level":"warn","ts":"2026-03-13T10:40:20.110805Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.704663629s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/namespaces/openshift-ovirt-infra\" ","response":"range_response_count:1 size:1855"} 2026-03-13T10:40:20.115514171Z {"level":"info","ts":"2026-03-13T10:40:20.115464Z","caller":"traceutil/trace.go:171","msg":"trace[1287418667] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-ovirt-infra; range_end:; response_count:1; response_revision:10226; }","duration":"1.709341885s","start":"2026-03-13T10:40:18.406112Z","end":"2026-03-13T10:40:20.115454Z","steps":["trace[1287418667] 'agreement among raft nodes before linearized reading' (duration: 1.704667179s)"],"step_count":1} 2026-03-13T10:40:20.115531652Z {"level":"info","ts":"2026-03-13T10:40:20.109375Z","caller":"traceutil/trace.go:171","msg":"trace[235571949] range","detail":"{range_begin:/kubernetes.io/roles/openshift-console-operator/prometheus-k8s; range_end:; response_count:0; response_revision:10226; }","duration":"3.641376692s","start":"2026-03-13T10:40:16.467991Z","end":"2026-03-13T10:40:20.109368Z","steps":["trace[235571949] 'agreement among raft nodes before linearized reading' (duration: 3.640482848s)"],"step_count":1} 2026-03-13T10:40:20.115531652Z {"level":"warn","ts":"2026-03-13T10:40:20.115496Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.406097Z","time spent":"1.709391477s","remote":"[::1]:54952","response type":"/etcdserverpb.KV/Range","request count":0,"request size":49,"response count":1,"response size":1879,"request content":"key:\"/kubernetes.io/namespaces/openshift-ovirt-infra\" "} 2026-03-13T10:40:20.115628154Z {"level":"warn","ts":"2026-03-13T10:40:20.115538Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:16.467973Z","time spent":"3.647528178s","remote":"[::1]:39244","response type":"/etcdserverpb.KV/Range","request count":0,"request size":64,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/roles/openshift-console-operator/prometheus-k8s\" "} 2026-03-13T10:40:20.117741621Z {"level":"warn","ts":"2026-03-13T10:40:20.111533Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.403060Z","time spent":"1.70846729s","remote":"[::1]:46508","response type":"/etcdserverpb.KV/Range","request count":0,"request size":91,"response count":1,"response size":1729,"request content":"key:\"/kubernetes.io/services/specs/openshift-cluster-olm-operator/cluster-olm-operator-metrics\" "} 2026-03-13T10:40:20.119524899Z {"level":"info","ts":"2026-03-13T10:40:20.111573Z","caller":"traceutil/trace.go:171","msg":"trace[1575298566] range","detail":"{range_begin:/kubernetes.io/services/specs/openshift-apiserver/check-endpoints; range_end:; response_count:1; response_revision:10226; }","duration":"1.703450937s","start":"2026-03-13T10:40:18.408116Z","end":"2026-03-13T10:40:20.111567Z","steps":["trace[1575298566] 'agreement among raft nodes before linearized reading' (duration: 1.703030866s)"],"step_count":1} 2026-03-13T10:40:20.119524899Z {"level":"warn","ts":"2026-03-13T10:40:20.119482Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.408109Z","time spent":"1.711341619s","remote":"[::1]:46508","response type":"/etcdserverpb.KV/Range","request count":0,"request size":67,"response count":1,"response size":1449,"request content":"key:\"/kubernetes.io/services/specs/openshift-apiserver/check-endpoints\" "} 2026-03-13T10:40:20.122980922Z {"level":"warn","ts":"2026-03-13T10:40:20.122897Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-13T10:40:18.408348Z","time spent":"1.714513015s","remote":"[::1]:54488","response type":"/etcdserverpb.KV/Range","request count":0,"request size":91,"response count":1,"response size":1259,"request content":"key:\"/kubernetes.io/clusterrolebindings/system:openshift:operator:openshift-apiserver-operator\" "} 2026-03-13T10:40:59.717796448Z {"level":"info","ts":"2026-03-13T10:40:59.717428Z","caller":"traceutil/trace.go:171","msg":"trace[1471224054] transaction","detail":"{read_only:false; response_revision:10618; number_of_response:1; }","duration":"186.738387ms","start":"2026-03-13T10:40:59.530672Z","end":"2026-03-13T10:40:59.717411Z","steps":["trace[1471224054] 'process raft request' (duration: 186.630504ms)"],"step_count":1} 2026-03-13T10:40:59.717953952Z {"level":"info","ts":"2026-03-13T10:40:59.717900Z","caller":"traceutil/trace.go:171","msg":"trace[1498895353] linearizableReadLoop","detail":"{readStateIndex:11242; appliedIndex:11242; }","duration":"177.18591ms","start":"2026-03-13T10:40:59.540707Z","end":"2026-03-13T10:40:59.717893Z","steps":["trace[1498895353] 'read index received' (duration: 177.18325ms)","trace[1498895353] 'applied index is now lower than readState.Index' (duration: 2.33µs)"],"step_count":2} 2026-03-13T10:40:59.717953952Z {"level":"info","ts":"2026-03-13T10:40:59.717944Z","caller":"traceutil/trace.go:171","msg":"trace[507636023] range","detail":"{range_begin:/kubernetes.io/validatingwebhookconfigurations; range_end:; response_count:0; response_revision:10618; }","duration":"177.258523ms","start":"2026-03-13T10:40:59.540681Z","end":"2026-03-13T10:40:59.717939Z","steps":["trace[507636023] 'agreement among raft nodes before linearized reading' (duration: 177.242382ms)"],"step_count":1} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715154764724023141 0ustar00000000000000002026-03-13T10:37:01.479750501Z Fixing etcd log permissions.Fixing etcd auto backup permissions.config/pod/openshift-oauth-apiserver/logs/apiserver-778fb45b4-65f7b/oauth-apiserver_current.log0000640000000000000000000011450315154764724031035 0ustar00000000000000002026-03-13T10:39:03.525771192Z E0313 10:39:03.525755 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:03.525875985Z E0313 10:39:03.525624 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:03.582016469Z E0313 10:39:03.581932 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:03.582065560Z E0313 10:39:03.582026 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:03.582222215Z E0313 10:39:03.582188 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:03.582366329Z E0313 10:39:03.582337 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:03.582442692Z E0313 10:39:03.581932 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:29.852872559Z E0313 10:39:29.848311 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:29.852872559Z E0313 10:39:29.848371 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:29.852872559Z E0313 10:39:29.848521 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:29.852872559Z E0313 10:39:29.848568 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:29.852872559Z E0313 10:39:29.848371 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:29.852872559Z E0313 10:39:29.848736 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:29.853073924Z E0313 10:39:29.853036 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:29.853342771Z E0313 10:39:29.853305 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:29.853384722Z E0313 10:39:29.853360 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:29.853453214Z E0313 10:39:29.853410 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:33.824819433Z E0313 10:39:33.824738 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:33.825118051Z E0313 10:39:33.825090 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:33.825288695Z E0313 10:39:33.825261 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:33.825445199Z E0313 10:39:33.825417 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:33.825633114Z E0313 10:39:33.825575 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:33.825786578Z E0313 10:39:33.825760 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:33.825960283Z E0313 10:39:33.825934 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:33.826108367Z E0313 10:39:33.826087 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:33.826259021Z E0313 10:39:33.826240 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:33.826725573Z E0313 10:39:33.826700 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:33.827545555Z I0313 10:39:33.827285 1 policy_source.go:224] refreshing policies 2026-03-13T10:39:59.838459036Z E0313 10:39:59.838383 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.839001161Z E0313 10:39:59.838975 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.840891821Z E0313 10:39:59.839097 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.848888942Z E0313 10:39:59.848849 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.848948324Z E0313 10:39:59.848855 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.849049006Z E0313 10:39:59.849017 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.849049006Z E0313 10:39:59.849030 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.849247062Z E0313 10:39:59.849218 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.849285693Z E0313 10:39:59.848933 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.849422416Z E0313 10:39:59.849406 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.935663148Z E0313 10:39:59.935297 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.944656196Z E0313 10:39:59.941383 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.947835660Z E0313 10:39:59.947800 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:39:59.953171361Z E0313 10:39:59.953127 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:00.856086316Z I0313 10:40:00.854676 1 policy_source.go:224] refreshing policies 2026-03-13T10:40:01.855459724Z I0313 10:40:01.855363 1 policy_source.go:224] refreshing policies 2026-03-13T10:40:01.869320510Z I0313 10:40:01.869239 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-13T10:40:01.872543336Z I0313 10:40:01.872498 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T10:40:03.829778452Z E0313 10:40:03.829696 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:03.829778452Z E0313 10:40:03.829744 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:03.830015688Z E0313 10:40:03.829978 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:03.830174462Z E0313 10:40:03.830150 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:03.830252004Z E0313 10:40:03.830224 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:03.839615502Z E0313 10:40:03.839550 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:03.839644283Z E0313 10:40:03.839608 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:03.839981232Z E0313 10:40:03.839936 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:03.840019643Z E0313 10:40:03.839995 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:03.840167717Z E0313 10:40:03.840127 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:29.838565190Z E0313 10:40:29.838457 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:29.838565190Z E0313 10:40:29.838533 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:29.838565190Z E0313 10:40:29.838533 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:29.838654072Z E0313 10:40:29.838457 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:29.838921859Z E0313 10:40:29.838751 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:29.839360871Z E0313 10:40:29.838457 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:29.839728941Z E0313 10:40:29.839576 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:29.839728941Z E0313 10:40:29.838761 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:29.839937536Z E0313 10:40:29.839909 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:29.848428935Z E0313 10:40:29.846670 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:33.842229453Z E0313 10:40:33.842139 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:33.842611343Z E0313 10:40:33.842560 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:33.842829599Z E0313 10:40:33.842796 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:33.843046995Z E0313 10:40:33.843003 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:33.843268491Z E0313 10:40:33.843235 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:33.852729606Z E0313 10:40:33.852629 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:33.852935961Z E0313 10:40:33.852805 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:33.853011003Z E0313 10:40:33.852964 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:33.853193308Z E0313 10:40:33.853084 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:33.853229329Z E0313 10:40:33.853090 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.845673361Z E0313 10:40:59.845577 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.845673361Z E0313 10:40:59.845627 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.845937708Z E0313 10:40:59.845603 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.846163744Z E0313 10:40:59.846145 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.846339869Z E0313 10:40:59.846300 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.846365160Z E0313 10:40:59.846351 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.846399670Z E0313 10:40:59.846365 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.846455912Z E0313 10:40:59.846404 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.846528374Z E0313 10:40:59.846484 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.846548214Z E0313 10:40:59.846380 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.935711615Z E0313 10:40:59.935621 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.943993908Z E0313 10:40:59.943911 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.944058460Z E0313 10:40:59.944036 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:40:59.952108937Z E0313 10:40:59.952059 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:41:03.854031350Z E0313 10:41:03.853962 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:41:03.854194955Z E0313 10:41:03.853962 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:41:03.854274997Z E0313 10:41:03.854240 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:41:03.854291807Z E0313 10:41:03.853982 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:41:03.854397350Z E0313 10:41:03.854054 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:41:03.862603701Z E0313 10:41:03.861716 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:41:03.862603701Z E0313 10:41:03.861814 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:41:03.862603701Z E0313 10:41:03.861848 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:41:03.862603701Z E0313 10:41:03.861864 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" 2026-03-13T10:41:03.862603701Z E0313 10:41:03.861848 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=9215934472173434341, SKID=BA:98:D3:AA:27:62:7C:6A:70:7E:A0:BA:61:6F:19:12:C6:FA:A2:89, AKID=67:6F:AB:84:3D:46:89:A0:57:CB:06:CF:34:F9:08:70:4B:FC:22:CC failed: x509: certificate signed by unknown authority]" config/pod/openshift-ingress/logs/router-default-79f8cd6fdd-b4x54/router_current.log0000640000000000000000000002237215154764724027070 0ustar00000000000000002026-03-13T10:40:38.883538024Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:38.883538024Z [-]has-synced failed: Router not synced 2026-03-13T10:40:39.882727575Z I0313 10:40:39.882648 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:39.882727575Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:39.882727575Z [-]has-synced failed: Router not synced 2026-03-13T10:40:40.883168501Z I0313 10:40:40.883098 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:40.883168501Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:40.883168501Z [-]has-synced failed: Router not synced 2026-03-13T10:40:41.883218776Z I0313 10:40:41.883130 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:41.883218776Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:41.883218776Z [-]has-synced failed: Router not synced 2026-03-13T10:40:42.882427219Z I0313 10:40:42.882349 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:42.882427219Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:42.882427219Z [-]has-synced failed: Router not synced 2026-03-13T10:40:43.882960516Z I0313 10:40:43.882881 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:43.882960516Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:43.882960516Z [-]has-synced failed: Router not synced 2026-03-13T10:40:44.883149145Z I0313 10:40:44.882835 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:44.883149145Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:44.883149145Z [-]has-synced failed: Router not synced 2026-03-13T10:40:45.882640505Z I0313 10:40:45.882549 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:45.882640505Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:45.882640505Z [-]has-synced failed: Router not synced 2026-03-13T10:40:46.883087470Z I0313 10:40:46.883010 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:46.883087470Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:46.883087470Z [-]has-synced failed: Router not synced 2026-03-13T10:40:47.883037093Z I0313 10:40:47.882964 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:47.883037093Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:47.883037093Z [-]has-synced failed: Router not synced 2026-03-13T10:40:48.883256763Z I0313 10:40:48.882853 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:48.883256763Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:48.883256763Z [-]has-synced failed: Router not synced 2026-03-13T10:40:49.381484307Z W0313 10:40:49.381409 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:40:49.381484307Z E0313 10:40:49.381454 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-13T10:40:49.882516947Z I0313 10:40:49.882447 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:49.882516947Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:49.882516947Z [-]has-synced failed: Router not synced 2026-03-13T10:40:50.882354036Z I0313 10:40:50.882252 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:50.882354036Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:50.882354036Z [-]has-synced failed: Router not synced 2026-03-13T10:40:51.882956566Z I0313 10:40:51.882900 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:51.882956566Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:51.882956566Z [-]has-synced failed: Router not synced 2026-03-13T10:40:52.882521468Z I0313 10:40:52.882421 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:52.882521468Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:52.882521468Z [-]has-synced failed: Router not synced 2026-03-13T10:40:53.882763018Z I0313 10:40:53.882607 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:53.882763018Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:53.882763018Z [-]has-synced failed: Router not synced 2026-03-13T10:40:54.882804133Z I0313 10:40:54.882723 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:54.882804133Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:54.882804133Z [-]has-synced failed: Router not synced 2026-03-13T10:40:55.881545563Z I0313 10:40:55.881464 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:55.881545563Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:55.881545563Z [-]has-synced failed: Router not synced 2026-03-13T10:40:56.883303624Z I0313 10:40:56.883226 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:56.883303624Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:56.883303624Z [-]has-synced failed: Router not synced 2026-03-13T10:40:57.883204254Z I0313 10:40:57.883100 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:57.883204254Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:57.883204254Z [-]has-synced failed: Router not synced 2026-03-13T10:40:58.882475258Z I0313 10:40:58.882359 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:58.882475258Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:58.882475258Z [-]has-synced failed: Router not synced 2026-03-13T10:40:59.883053657Z I0313 10:40:59.882938 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:40:59.883053657Z [-]backend-http failed: backend reported failure 2026-03-13T10:40:59.883053657Z [-]has-synced failed: Router not synced 2026-03-13T10:41:00.882509036Z I0313 10:41:00.882433 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:41:00.882509036Z [-]backend-http failed: backend reported failure 2026-03-13T10:41:00.882509036Z [-]has-synced failed: Router not synced 2026-03-13T10:41:01.882572161Z I0313 10:41:01.882511 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:41:01.882572161Z [-]backend-http failed: backend reported failure 2026-03-13T10:41:01.882572161Z [-]has-synced failed: Router not synced 2026-03-13T10:41:02.882431761Z I0313 10:41:02.882347 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:41:02.882431761Z [-]backend-http failed: backend reported failure 2026-03-13T10:41:02.882431761Z [-]has-synced failed: Router not synced 2026-03-13T10:41:03.882879207Z I0313 10:41:03.882385 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:41:03.882879207Z [-]backend-http failed: backend reported failure 2026-03-13T10:41:03.882879207Z [-]has-synced failed: Router not synced 2026-03-13T10:41:04.882989873Z I0313 10:41:04.882938 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:41:04.882989873Z [-]backend-http failed: backend reported failure 2026-03-13T10:41:04.882989873Z [-]has-synced failed: Router not synced 2026-03-13T10:41:05.882634337Z I0313 10:41:05.882499 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:41:05.882634337Z [-]backend-http failed: backend reported failure 2026-03-13T10:41:05.882634337Z [-]has-synced failed: Router not synced 2026-03-13T10:41:06.882374024Z I0313 10:41:06.882294 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:41:06.882374024Z [-]backend-http failed: backend reported failure 2026-03-13T10:41:06.882374024Z [-]has-synced failed: Router not synced 2026-03-13T10:41:07.883734585Z I0313 10:41:07.883648 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:41:07.883734585Z [-]backend-http failed: backend reported failure 2026-03-13T10:41:07.883734585Z [-]has-synced failed: Router not synced 2026-03-13T10:41:08.883887192Z I0313 10:41:08.883518 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:41:08.883887192Z [-]backend-http failed: backend reported failure 2026-03-13T10:41:08.883887192Z [-]has-synced failed: Router not synced 2026-03-13T10:41:09.882535389Z I0313 10:41:09.882473 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:41:09.882535389Z [-]backend-http failed: backend reported failure 2026-03-13T10:41:09.882535389Z [-]has-synced failed: Router not synced 2026-03-13T10:41:10.882083121Z I0313 10:41:10.882004 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-13T10:41:10.882083121Z [-]backend-http failed: backend reported failure 2026-03-13T10:41:10.882083121Z [-]has-synced failed: Router not synced authentication-operator_current.log0000640000000000000000000003427515154764724037532 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-7c6989d6c4-cwlxw2026-03-13T10:37:53.894197399Z Copying system trust bundle 2026-03-13T10:37:53.955685626Z W0313 10:37:53.955578 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-03-13T10:37:53.957124289Z I0313 10:37:53.957047 1 observer_polling.go:159] Starting file observer 2026-03-13T10:37:53.958137420Z I0313 10:37:53.958098 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T10:37:53.958208172Z I0313 10:37:53.958149 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T10:37:53.958639395Z I0313 10:37:53.958604 1 observer_polling.go:159] Starting file observer 2026-03-13T10:38:42.975738698Z I0313 10:38:42.975656 1 builder.go:304] cluster-authentication-operator version - 2026-03-13T10:38:42.976502592Z I0313 10:38:42.976446 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T10:38:43.492948339Z I0313 10:38:43.492869 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-13T10:38:43.499878299Z I0313 10:38:43.499168 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-13T10:38:43.499878299Z I0313 10:38:43.499193 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-13T10:38:43.499878299Z I0313 10:38:43.499210 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-13T10:38:43.499878299Z I0313 10:38:43.499215 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-13T10:38:43.515924716Z I0313 10:38:43.514180 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T10:38:43.515924716Z W0313 10:38:43.514239 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:38:43.515924716Z W0313 10:38:43.514246 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T10:38:43.515924716Z W0313 10:38:43.514250 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T10:38:43.515924716Z W0313 10:38:43.514256 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T10:38:43.515924716Z W0313 10:38:43.514259 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T10:38:43.515924716Z W0313 10:38:43.514262 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T10:38:43.515924716Z I0313 10:38:43.514393 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-13T10:38:43.519705261Z I0313 10:38:43.519275 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773398171\" (2026-03-13 10:36:12 +0000 UTC to 2028-03-12 10:36:13 +0000 UTC (now=2026-03-13 10:38:43.519245267 +0000 UTC))" 2026-03-13T10:38:43.519705261Z I0313 10:38:43.519384 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773398323\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773398323\" (2026-03-13 09:38:42 +0000 UTC to 2027-03-13 09:38:42 +0000 UTC (now=2026-03-13 10:38:43.5193669 +0000 UTC))" 2026-03-13T10:38:43.519705261Z I0313 10:38:43.519401 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T10:38:43.519705261Z I0313 10:38:43.519425 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-13T10:38:43.519705261Z I0313 10:38:43.519444 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T10:38:43.519705261Z I0313 10:38:43.519468 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T10:38:43.519705261Z I0313 10:38:43.519498 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:38:43.519705261Z I0313 10:38:43.519520 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T10:38:43.519705261Z I0313 10:38:43.519648 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T10:38:43.519705261Z I0313 10:38:43.519658 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T10:38:43.519705261Z I0313 10:38:43.519664 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T10:38:43.523670161Z I0313 10:38:43.519837 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T10:38:43.523670161Z I0313 10:38:43.519849 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:38:43.523670161Z I0313 10:38:43.519531 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:38:43.529677884Z I0313 10:38:43.529608 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-13T10:38:43.531337384Z I0313 10:38:43.530343 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-13T10:38:43.531337384Z I0313 10:38:43.530749 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-03-13T10:38:43.622576253Z I0313 10:38:43.622495 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T10:38:43.622658066Z I0313 10:38:43.622609 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T10:38:43.622790130Z I0313 10:38:43.622760 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T10:38:43.623110830Z I0313 10:38:43.623077 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 10:17:45 +0000 UTC to 2036-03-10 10:17:45 +0000 UTC (now=2026-03-13 10:38:43.623045658 +0000 UTC))" 2026-03-13T10:38:43.623135470Z I0313 10:38:43.623110 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2026-03-14 10:24:19 +0000 UTC (now=2026-03-13 10:38:43.623094789 +0000 UTC))" 2026-03-13T10:38:43.623135470Z I0313 10:38:43.623131 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2027-03-13 10:24:19 +0000 UTC (now=2026-03-13 10:38:43.62311626 +0000 UTC))" 2026-03-13T10:38:43.623186692Z I0313 10:38:43.623160 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2027-03-13 10:24:19 +0000 UTC (now=2026-03-13 10:38:43.62313562 +0000 UTC))" 2026-03-13T10:38:43.623186692Z I0313 10:38:43.623178 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 10:24:16 +0000 UTC to 2036-03-10 10:24:16 +0000 UTC (now=2026-03-13 10:38:43.623170592 +0000 UTC))" 2026-03-13T10:38:43.623369038Z I0313 10:38:43.623335 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773398171\" (2026-03-13 10:36:12 +0000 UTC to 2028-03-12 10:36:13 +0000 UTC (now=2026-03-13 10:38:43.623321726 +0000 UTC))" 2026-03-13T10:38:43.623485981Z I0313 10:38:43.623460 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773398323\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773398323\" (2026-03-13 09:38:42 +0000 UTC to 2027-03-13 09:38:42 +0000 UTC (now=2026-03-13 10:38:43.62344766 +0000 UTC))" 2026-03-13T10:38:43.623664107Z I0313 10:38:43.623640 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 10:17:45 +0000 UTC to 2036-03-10 10:17:45 +0000 UTC (now=2026-03-13 10:38:43.623628315 +0000 UTC))" 2026-03-13T10:38:43.623677967Z I0313 10:38:43.623660 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2026-03-14 10:24:19 +0000 UTC (now=2026-03-13 10:38:43.623652046 +0000 UTC))" 2026-03-13T10:38:43.623743579Z I0313 10:38:43.623676 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2027-03-13 10:24:19 +0000 UTC (now=2026-03-13 10:38:43.623667097 +0000 UTC))" 2026-03-13T10:38:43.623743579Z I0313 10:38:43.623718 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-13 10:24:19 +0000 UTC to 2027-03-13 10:24:19 +0000 UTC (now=2026-03-13 10:38:43.623708518 +0000 UTC))" 2026-03-13T10:38:43.623758719Z I0313 10:38:43.623733 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 10:24:16 +0000 UTC to 2036-03-10 10:24:16 +0000 UTC (now=2026-03-13 10:38:43.623724668 +0000 UTC))" 2026-03-13T10:38:43.623784240Z I0313 10:38:43.623766 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-13 10:24:17 +0000 UTC to 2026-03-14 10:24:17 +0000 UTC (now=2026-03-13 10:38:43.623757799 +0000 UTC))" 2026-03-13T10:38:43.623907374Z I0313 10:38:43.623882 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773398171\" (2026-03-13 10:36:12 +0000 UTC to 2028-03-12 10:36:13 +0000 UTC (now=2026-03-13 10:38:43.623871013 +0000 UTC))" 2026-03-13T10:38:43.623991776Z I0313 10:38:43.623973 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773398323\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773398323\" (2026-03-13 09:38:42 +0000 UTC to 2027-03-13 09:38:42 +0000 UTC (now=2026-03-13 10:38:43.623962616 +0000 UTC))" 2026-03-13T10:38:44.602166690Z I0313 10:38:44.601683 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T10:38:44.602166690Z I0313 10:38:44.602020 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... authentication-operator_previous.log0000640000000000000000000004575015154764724037724 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-7c6989d6c4-cwlxw2026-03-13T10:36:55.908064955Z I0313 10:36:55.908056 1 base_controller.go:113] All openshift-authentication-UnsupportedConfigOverrides workers have been terminated 2026-03-13T10:36:55.908148688Z I0313 10:36:55.908131 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-13T10:36:55.908186149Z I0313 10:36:55.908173 1 genericapiserver.go:549] "[graceful-termination] shutdown event" name="AfterShutdownDelayDuration" 2026-03-13T10:36:55.908233610Z I0313 10:36:55.908197 1 base_controller.go:181] Shutting down WebhookAuthenticatorCertApprover_OpenShiftAuthenticator ... 2026-03-13T10:36:55.908233610Z I0313 10:36:55.908213 1 genericapiserver.go:615] "[graceful-termination] shutdown event" name="NotAcceptingNewRequest" 2026-03-13T10:36:55.908268411Z I0313 10:36:55.908248 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorCertApprover_OpenShiftAuthenticator controller ... 2026-03-13T10:36:55.908310812Z I0313 10:36:55.908287 1 base_controller.go:181] Shutting down openshift-authentication-ServiceCA ... 2026-03-13T10:36:55.908310812Z I0313 10:36:55.908306 1 base_controller.go:181] Shutting down authentication-ManagementState ... 2026-03-13T10:36:55.908321232Z I0313 10:36:55.908315 1 base_controller.go:123] Shutting down worker of openshift-authentication-ServiceCA controller ... 2026-03-13T10:36:55.908329263Z I0313 10:36:55.908320 1 base_controller.go:113] All openshift-authentication-ServiceCA workers have been terminated 2026-03-13T10:36:55.908337393Z I0313 10:36:55.908328 1 base_controller.go:123] Shutting down worker of authentication-ManagementState controller ... 2026-03-13T10:36:55.908348753Z I0313 10:36:55.908342 1 base_controller.go:181] Shutting down openshift-authentication-IngressState ... 2026-03-13T10:36:55.908370154Z I0313 10:36:55.908293 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-13T10:36:55.908397614Z I0313 10:36:55.908358 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-13T10:36:55.908433045Z I0313 10:36:55.908411 1 base_controller.go:159] All StatusSyncer_authentication post start hooks have been terminated 2026-03-13T10:36:55.908443096Z I0313 10:36:55.908411 1 base_controller.go:113] All openshift-authentication-RemoveStaleConditions workers have been terminated 2026-03-13T10:36:55.908451466Z I0313 10:36:55.908377 1 base_controller.go:181] Shutting down oauth-server ... 2026-03-13T10:36:55.908460076Z I0313 10:36:55.908421 1 base_controller.go:113] All StatusSyncer_authentication workers have been terminated 2026-03-13T10:36:55.908468376Z I0313 10:36:55.908399 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2026-03-13T10:36:55.908499127Z I0313 10:36:55.908486 1 base_controller.go:113] All WebhookAuthenticatorCertApprover_OpenShiftAuthenticator workers have been terminated 2026-03-13T10:36:55.908525818Z I0313 10:36:55.908490 1 base_controller.go:123] Shutting down worker of openshift-authentication-IngressState controller ... 2026-03-13T10:36:55.908567069Z E0313 10:36:55.908536 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the operator is shutting down, skipping updating conditions, err = failed to reconcile enabled APIs: [Get \"https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices/v1.oauth.openshift.io\": context canceled, client rate limiter Wait returned an error: context canceled]" 2026-03-13T10:36:55.908582969Z I0313 10:36:55.908545 1 base_controller.go:113] All openshift-authentication-IngressState workers have been terminated 2026-03-13T10:36:55.908626891Z I0313 10:36:55.908578 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-13T10:36:55.908626891Z I0313 10:36:55.908608 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T10:36:55.908657381Z I0313 10:36:55.908633 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T10:36:55.908657381Z I0313 10:36:55.908640 1 base_controller.go:181] Shutting down OAuthAPIServerController-WorkloadWorkloadController ... 2026-03-13T10:36:55.908657381Z I0313 10:36:55.908614 1 base_controller.go:123] Shutting down worker of oauth-server controller ... 2026-03-13T10:36:55.908668792Z I0313 10:36:55.908656 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionKey ... 2026-03-13T10:36:55.908668792Z I0313 10:36:55.908659 1 base_controller.go:113] All oauth-server workers have been terminated 2026-03-13T10:36:55.908694972Z I0313 10:36:55.908677 1 base_controller.go:181] Shutting down NamespaceFinalizerController_openshift-oauth-apiserver ... 2026-03-13T10:36:55.908694972Z I0313 10:36:55.908684 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-13T10:36:55.908729043Z I0313 10:36:55.908707 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T10:36:55.908729043Z I0313 10:36:55.908720 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T10:36:55.908741324Z I0313 10:36:55.908734 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionPrune ... 2026-03-13T10:36:55.908751354Z E0313 10:36:55.908739 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver\": context canceled" 2026-03-13T10:36:55.908759704Z I0313 10:36:55.908752 1 base_controller.go:181] Shutting down SecretRevisionPruneController ... 2026-03-13T10:36:55.908767854Z I0313 10:36:55.908761 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionCondition ... 2026-03-13T10:36:55.908776545Z I0313 10:36:55.908769 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionState ... 2026-03-13T10:36:55.908784605Z I0313 10:36:55.908774 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionKey controller ... 2026-03-13T10:36:55.908793225Z I0313 10:36:55.908783 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionMigration ... 2026-03-13T10:36:55.908793225Z I0313 10:36:55.908784 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionKey workers have been terminated 2026-03-13T10:36:55.908803815Z I0313 10:36:55.908796 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionCondition controller ... 2026-03-13T10:36:55.908811966Z I0313 10:36:55.908801 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionPrune controller ... 2026-03-13T10:36:55.908811966Z I0313 10:36:55.908804 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionCondition workers have been terminated 2026-03-13T10:36:55.908820506Z I0313 10:36:55.908810 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionPrune workers have been terminated 2026-03-13T10:36:55.908833206Z I0313 10:36:55.908821 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-03-13T10:36:55.908833206Z I0313 10:36:55.908826 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionMigration controller ... 2026-03-13T10:36:55.908844307Z I0313 10:36:55.908837 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionMigration workers have been terminated 2026-03-13T10:36:55.908844307Z I0313 10:36:55.908839 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionState controller ... 2026-03-13T10:36:55.908852987Z I0313 10:36:55.908827 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-03-13T10:36:55.908852987Z I0313 10:36:55.908848 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionState workers have been terminated 2026-03-13T10:36:55.908886158Z I0313 10:36:55.908870 1 base_controller.go:113] All authentication-ManagementState workers have been terminated 2026-03-13T10:36:55.908926359Z I0313 10:36:55.908898 1 base_controller.go:123] Shutting down worker of OAuthServerServiceEndpointAccessibleController controller ... 2026-03-13T10:36:55.908926359Z I0313 10:36:55.908919 1 base_controller.go:113] All OAuthServerServiceEndpointAccessibleController workers have been terminated 2026-03-13T10:36:55.908938389Z I0313 10:36:55.908874 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-13T10:36:55.908938389Z I0313 10:36:55.908927 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-13T10:36:55.908938389Z E0313 10:36:55.908151 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-03-13T10:36:55.908969220Z I0313 10:36:55.908946 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-13T10:36:55.908969220Z I0313 10:36:55.908960 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-13T10:36:55.909029762Z I0313 10:36:55.908985 1 base_controller.go:181] Shutting down WebhookAuthenticatorController ... 2026-03-13T10:36:55.909029762Z I0313 10:36:55.909021 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorController controller ... 2026-03-13T10:36:55.909042452Z I0313 10:36:55.909027 1 base_controller.go:113] All WebhookAuthenticatorController workers have been terminated 2026-03-13T10:36:55.909071233Z E0313 10:36:55.909046 1 leaderelection.go:436] error retrieving resource lock openshift-authentication-operator/cluster-authentication-operator-lock: client rate limiter Wait returned an error: context canceled 2026-03-13T10:36:55.909082083Z I0313 10:36:55.909068 1 leaderelection.go:297] failed to renew lease openshift-authentication-operator/cluster-authentication-operator-lock: timed out waiting for the condition 2026-03-13T10:36:55.909105284Z I0313 10:36:55.909007 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1734157857/tls.crt::/tmp/serving-cert-1734157857/tls.key" 2026-03-13T10:36:55.909143665Z I0313 10:36:55.909125 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-13T10:36:55.909209896Z I0313 10:36:55.909157 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T10:36:55.909238647Z I0313 10:36:55.909196 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T10:36:55.909283738Z I0313 10:36:55.909271 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T10:36:55.909326170Z I0313 10:36:55.908903 1 genericapiserver.go:640] [graceful-termination] in-flight non long-running request(s) have drained 2026-03-13T10:36:55.909355140Z I0313 10:36:55.909333 1 genericapiserver.go:681] "[graceful-termination] shutdown event" name="InFlightRequestsDrained" 2026-03-13T10:36:55.909483984Z I0313 10:36:55.909277 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-13T10:36:55.909483984Z I0313 10:36:55.909477 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T10:36:55.909497854Z I0313 10:36:55.909488 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-13T10:36:55.909506244Z I0313 10:36:55.909496 1 builder.go:335] server exited 2026-03-13T10:36:55.909629558Z W0313 10:36:55.909555 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-13T10:36:55.909629558Z I0313 10:36:55.909576 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-03-13T10:36:55.909629558Z I0313 10:36:55.909609 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-03-13T10:36:55.909629558Z E0313 10:36:55.909614 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs\": context canceled" 2026-03-13T10:36:55.909799582Z I0313 10:36:55.909779 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-oauth-apiserver controller ... 2026-03-13T10:36:55.909799582Z I0313 10:36:55.909795 1 base_controller.go:113] All NamespaceFinalizerController_openshift-oauth-apiserver workers have been terminated 2026-03-13T10:36:55.910421339Z E0313 10:36:55.910388 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-13T10:36:55.910448340Z E0313 10:36:55.910428 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": client rate limiter Wait returned an error: context canceled" 2026-03-13T10:36:55.910448340Z E0313 10:36:55.910436 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver\": context canceled, \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T10:36:55.910779239Z I0313 10:36:55.910748 1 base_controller.go:123] Shutting down worker of RouterCertsDomainValidationController controller ... 2026-03-13T10:36:55.910779239Z I0313 10:36:55.910768 1 base_controller.go:113] All RouterCertsDomainValidationController workers have been terminated 2026-03-13T10:36:55.910834130Z E0313 10:36:55.910805 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": context canceled, \"oauth-openshift/oauth-service.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/trust_distribution_role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T10:36:55.911499178Z I0313 10:36:55.911483 1 base_controller.go:123] Shutting down worker of OAuthAPIServerController-WorkloadWorkloadController controller ... 2026-03-13T10:36:55.911538489Z I0313 10:36:55.911517 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-13T10:36:55.911547990Z I0313 10:36:55.911537 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-13T10:36:55.911667103Z I0313 10:36:55.911524 1 base_controller.go:113] All OAuthAPIServerController-WorkloadWorkloadController workers have been terminated 2026-03-13T10:36:55.911667103Z I0313 10:36:55.911484 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-03-13T10:36:55.911667103Z I0313 10:36:55.911640 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-03-13T10:36:55.911945590Z I0313 10:36:55.911917 1 base_controller.go:123] Shutting down worker of OpenshiftAuthenticationStaticResources-StaticResources controller ... 2026-03-13T10:36:55.911945590Z I0313 10:36:55.911936 1 base_controller.go:113] All OpenshiftAuthenticationStaticResources-StaticResources workers have been terminated 2026-03-13T10:37:00.907840634Z I0313 10:37:00.907764 1 observer_polling.go:162] Shutting down file observer 2026-03-13T10:37:22.309205176Z E0313 10:37:22.309092 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{authentication-operator.189c6045d90cb161 openshift-authentication-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-authentication-operator,Name:authentication-operator,UID:,APIVersion:,ResourceVersion:,FieldPath:,},Reason:OperatorStatusChanged,Message:Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.34\"}] to [{\"operator\" \"4.18.34\"} {\"oauth-apiserver\" \"4.18.34\"}],Source:EventSource{Component:oauth-apiserver-status-controller-statussyncer_authentication,Host:,},FirstTimestamp:2026-03-13 10:36:46.387630433 +0000 UTC m=+55.777179274,LastTimestamp:2026-03-13 10:36:46.387630433 +0000 UTC m=+55.777179274,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:oauth-apiserver-status-controller-statussyncer_authentication,ReportingInstance:,}" 2026-03-13T10:37:29.912983030Z E0313 10:37:29.912878 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T10:37:29.912983030Z W0313 10:37:29.912929 1 leaderelection.go:84] leader election lost config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-cwlxw.json0000640000000000000000000001607715154764724030423 0ustar0000000000000000{"metadata":{"name":"authentication-operator-7c6989d6c4-cwlxw","generateName":"authentication-operator-7c6989d6c4-","namespace":"openshift-authentication-operator","uid":"1434c4a2-5c4d-478a-a16a-7d6a52ea3099","resourceVersion":"7342","creationTimestamp":"2026-03-13T10:33:23Z","labels":{"app":"authentication-operator","pod-template-hash":"7c6989d6c4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.8/23\"],\"mac_address\":\"0a:58:0a:80:00:08\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.8/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.8\"\n ],\n \"mac\": \"0a:58:0a:80:00:08\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-7c6989d6c4","uid":"bc8aaad7-a4de-4192-bc58-e1c2188847ec","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-qqjkf","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3d3571ade02a7c61123d62c53fda6a57031a52c058c0571759dc09f96b23978f"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.34_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-qqjkf","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c10"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:46Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:43Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:43Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.8","podIPs":[{"ip":"10.128.0.8"}],"startTime":"2026-03-13T10:35:36Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-03-13T10:37:53Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T10:35:50Z","finishedAt":"2026-03-13T10:37:29Z","containerID":"cri-o://07efb32e685572e6b4d6844e3569402a8bdfbf11ae0829c85acd5de7788ca4d9"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","containerID":"cri-o://cd940301b6045fcf3388088b051ec834a3261f017e1dcca1b8063296e4c0a2f1","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-qqjkf","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000004723215154764724020663 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:29:38Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:29:49Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-854648ff6d to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:29:50Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-d64cfc9db to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:29:51Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-7d9c49f57b to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:29:51Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-854648ff6d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:29:52Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-7d9c49f57b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:29:52Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-d64cfc9db-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:33:21Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:33:22Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-854648ff6d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:33:22Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-d64cfc9db-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:33:22Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-7d9c49f57b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:33:25Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-854648ff6d-d5b45","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:33:25Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:33:25Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-7d9c49f57b-2j5jl","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:33:25Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:33:25Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-d64cfc9db-rsl2h","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:33:25Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:35:36Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-2j5jl to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:35:36Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-d5b45 to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:35:36Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rsl2h to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:35:44Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:35:44Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:35:44Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:36:18Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:36:18Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:36:18Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:37:52Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_catalog-operator-7d9c49f57b-2j5jl_openshift-operator-lifecycle-manager_c455a959-d764-4b4f-a1e0-95c27495dd9d_0(abc2d94a2830757ad54703560beae03da352ca64ea83e36ac972e407d84b7178): error adding pod openshift-operator-lifecycle-manager_catalog-operator-7d9c49f57b-2j5jl to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"abc2d94a2830757ad54703560beae03da352ca64ea83e36ac972e407d84b7178\" Netns:\"/var/run/netns/bf3e5f36-d656-43df-8516-223b95053d95\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-operator-lifecycle-manager;K8S_POD_NAME=catalog-operator-7d9c49f57b-2j5jl;K8S_POD_INFRA_CONTAINER_ID=abc2d94a2830757ad54703560beae03da352ca64ea83e36ac972e407d84b7178;K8S_POD_UID=c455a959-d764-4b4f-a1e0-95c27495dd9d\" Path:\"\" ERRORED: error configuring pod [openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-2j5jl] networking: Multus: [openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-2j5jl/c455a959-d764-4b4f-a1e0-95c27495dd9d]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod catalog-operator-7d9c49f57b-2j5jl in out of cluster comm: SetNetworkStatus: failed to update the pod catalog-operator-7d9c49f57b-2j5jl in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-operator-lifecycle-manager/pods/catalog-operator-7d9c49f57b-2j5jl?timeout=1m0s\": context deadline exceeded\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:37:52Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_package-server-manager-854648ff6d-d5b45_openshift-operator-lifecycle-manager_8a305f45-8689-45a8-8c8b-5954f2c863df_0(6cb81f4c72da50ad600ac5e03735b6bbe723a42675e865f0b69a00dc8d11db74): error adding pod openshift-operator-lifecycle-manager_package-server-manager-854648ff6d-d5b45 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"6cb81f4c72da50ad600ac5e03735b6bbe723a42675e865f0b69a00dc8d11db74\" Netns:\"/var/run/netns/eda6c5ea-7822-49b0-8817-36bc270b04e1\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-operator-lifecycle-manager;K8S_POD_NAME=package-server-manager-854648ff6d-d5b45;K8S_POD_INFRA_CONTAINER_ID=6cb81f4c72da50ad600ac5e03735b6bbe723a42675e865f0b69a00dc8d11db74;K8S_POD_UID=8a305f45-8689-45a8-8c8b-5954f2c863df\" Path:\"\" ERRORED: error configuring pod [openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-d5b45] networking: Multus: [openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-d5b45/8a305f45-8689-45a8-8c8b-5954f2c863df]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod package-server-manager-854648ff6d-d5b45 in out of cluster comm: SetNetworkStatus: failed to update the pod package-server-manager-854648ff6d-d5b45 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-operator-lifecycle-manager/pods/package-server-manager-854648ff6d-d5b45?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:37:52Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_olm-operator-d64cfc9db-rsl2h_openshift-operator-lifecycle-manager_2afe3890-e844-4dd3-ba49-3ac9178549bf_0(852ad08ff9ec61972354a90873f764dae94c57b9bc9fa8c6cf6043cc6a157065): error adding pod openshift-operator-lifecycle-manager_olm-operator-d64cfc9db-rsl2h to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"852ad08ff9ec61972354a90873f764dae94c57b9bc9fa8c6cf6043cc6a157065\" Netns:\"/var/run/netns/ba6aaa92-aab5-413c-bb4e-80b81c39ffe5\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-operator-lifecycle-manager;K8S_POD_NAME=olm-operator-d64cfc9db-rsl2h;K8S_POD_INFRA_CONTAINER_ID=852ad08ff9ec61972354a90873f764dae94c57b9bc9fa8c6cf6043cc6a157065;K8S_POD_UID=2afe3890-e844-4dd3-ba49-3ac9178549bf\" Path:\"\" ERRORED: error configuring pod [openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rsl2h] networking: Multus: [openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-rsl2h/2afe3890-e844-4dd3-ba49-3ac9178549bf]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod olm-operator-d64cfc9db-rsl2h in out of cluster comm: SetNetworkStatus: failed to update the pod olm-operator-d64cfc9db-rsl2h in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-operator-lifecycle-manager/pods/olm-operator-d64cfc9db-rsl2h?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:43Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.22/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:43Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.15/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:43Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.26/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:44Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:44Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:44Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:54Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:54Z","reason":"LeaderElection","message":"package-server-manager-854648ff6d-d5b45_49a2a9b8-bf17-4ab4-ab94-e2263d56e025 became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:54Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:54Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 10.144s (10.144s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:54Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 10.562s (10.562s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:54Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:54Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:54Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 10.724s (10.724s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:54Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:54Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:56Z","reason":"NoOperatorGroup","message":"csv in namespace with no operatorgroups","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:38:57Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:39:28Z","reason":"RequirementsUnknown","message":"InstallModes now support target namespaces","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:39:29Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-7b564dfc5b-qc9cq","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:39:29Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:39:29Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-7b564dfc5b to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:39:29Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:39:29Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:39:30Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:39:30Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:39:30Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T10:39:30Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.60/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-route-controller-manager.json0000640000000000000000000000753015154764724020407 0ustar0000000000000000{"items":[{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-fc5589ff to 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-13T10:35:55Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-fc5589ff-d48hw","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-13T10:35:56Z","reason":"Scheduled","message":"Successfully assigned openshift-route-controller-manager/route-controller-manager-fc5589ff-d48hw to master-0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-13T10:36:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-13T10:36:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-13T10:36:32Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-657b8bf46d-r5dxm","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-13T10:36:32Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-fc5589ff-d48hw","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-13T10:36:32Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-fc5589ff to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-13T10:36:32Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-657b8bf46d to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-13T10:36:34Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-13T10:36:36Z","reason":"Scheduled","message":"Successfully assigned openshift-route-controller-manager/route-controller-manager-657b8bf46d-r5dxm to master-0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-13T10:36:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06\"","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-13T10:36:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-13T10:36:41Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06\" in 3.631s (3.631s including waiting). Image size: 487090672 bytes.","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-13T10:36:44Z","reason":"Created","message":"Created container: route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-13T10:36:44Z","reason":"Started","message":"Started container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-13T10:36:45Z","reason":"LeaderElection","message":"route-controller-manager-657b8bf46d-r5dxm_0c4b20db-1fef-4300-a550-c0d554308c71 became leader","type":"Normal"}]}events/openshift-controller-manager.json0000640000000000000000000001714515154764724017256 0ustar0000000000000000{"items":[{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:35:53Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-6f7fd6c796 to 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:35:55Z","reason":"FailedCreate","message":"Error creating: pods \"controller-manager-6f7fd6c796-\" is forbidden: error looking up service account openshift-controller-manager/openshift-controller-manager-sa: serviceaccount \"openshift-controller-manager-sa\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-6f7fd6c796 to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-67f68cdb6 to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:35:56Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-67f68cdb6-lbnl6","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:35:56Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:35:56Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-67f68cdb6-lbnl6 to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:35:56Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-7c5b48d77b-g5f7k","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-7c5b48d77b to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-67f68cdb6 to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:35:56Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-67f68cdb6-lbnl6","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:35:57Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:35:57Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:35:58Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-7c5b48d77b-g5f7k to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:36:14Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:36:30Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:36:32Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-7c5b48d77b-g5f7k","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:36:32Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-6954c8766d-g8z48","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:36:32Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-7c5b48d77b to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:36:32Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-6954c8766d to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:36:34Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:36:36Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-6954c8766d-g8z48 to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:36:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5\"","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:36:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.43/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:36:44Z","reason":"Started","message":"Started container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:36:44Z","reason":"Created","message":"Created container: controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:36:44Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5\" in 6.824s (6.825s including waiting). Image size: 558210153 bytes.","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:36:44Z","reason":"LeaderElection","message":"controller-manager-6954c8766d-g8z48 became leader","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:37:46Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.43:8443/healthz\": dial tcp 10.128.0.43:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:37:46Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.43:8443/healthz\": dial tcp 10.128.0.43:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:38:26Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.43:8443/healthz\": dial tcp 10.128.0.43:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:38:26Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.43:8443/healthz\": dial tcp 10.128.0.43:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:38:27Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5\" already present on machine","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-13T10:38:42Z","reason":"LeaderElection","message":"controller-manager-6954c8766d-g8z48 became leader","type":"Normal"}]}events/openshift-controller-manager-operator.json0000640000000000000000000007701515154764724021111 0ustar0000000000000000{"items":[{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:29:36Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-controller-manager-operator-8565d84698 to 1","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:29:46Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-controller-manager-operator-8565d84698-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:33:22Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-controller-manager-operator-8565d84698-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:33:25Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:33:25Z","reason":"SuccessfulCreate","message":"Created pod: openshift-controller-manager-operator-8565d84698-nsg74","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:36Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager-operator/openshift-controller-manager-operator-8565d84698-nsg74 to master-0","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:47Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:50Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b\" in 3.662s (3.662s including waiting). Image size: 507967997 bytes.","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"LeaderElection","message":"openshift-controller-manager-operator-8565d84698-nsg74_9e2c51e8-5c74-41f5-ab4d-62079358db5e became leader","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to BuildCSIVolumes=true","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"build\": map[string]any{\n+ \t\t\"buildDefaults\": map[string]any{\"resources\": map[string]any{}},\n+ \t\t\"imageTemplateFormat\": map[string]any{\n+ \t\t\t\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2e95c47e9d\"...),\n+ \t\t},\n+ \t},\n+ \t\"controllers\": []any{\n+ \t\tstring(\"openshift.io/build\"), string(\"openshift.io/build-config-change\"),\n+ \t\tstring(\"openshift.io/builder-rolebindings\"),\n+ \t\tstring(\"openshift.io/builder-serviceaccount\"),\n+ \t\tstring(\"-openshift.io/default-rolebindings\"), string(\"openshift.io/deployer\"),\n+ \t\tstring(\"openshift.io/deployer-rolebindings\"),\n+ \t\tstring(\"openshift.io/deployer-serviceaccount\"),\n+ \t\tstring(\"openshift.io/deploymentconfig\"), string(\"openshift.io/image-import\"),\n+ \t\tstring(\"openshift.io/image-puller-rolebindings\"),\n+ \t\tstring(\"openshift.io/image-signature-import\"),\n+ \t\tstring(\"openshift.io/image-trigger\"), string(\"openshift.io/ingress-ip\"),\n+ \t\tstring(\"openshift.io/ingress-to-route\"),\n+ \t\tstring(\"openshift.io/origin-namespace\"), ...,\n+ \t},\n+ \t\"deployer\": map[string]any{\n+ \t\t\"imageTemplateFormat\": map[string]any{\n+ \t\t\t\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:52d35a623b\"...),\n+ \t\t},\n+ \t},\n+ \t\"featureGates\": []any{string(\"BuildCSIVolumes=true\")},\n+ \t\"ingress\": map[string]any{\"ingressIPNetworkCIDR\": string(\"\")},\n }\n","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftcontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"openshift-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-route-controller-manager\"}]","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/config -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"RoleCreateFailed","message":"Failed to create Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"ConfigMapCreateFailed","message":"Failed to create configmap/openshift-service-ca-n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"RoleBindingCreateFailed","message":"Failed to create RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/openshift-global-ca -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/config -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"DeploymentCreated","message":"Created Deployment.apps/controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"RoleCreateFailed","message":"Failed to create Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"DeploymentCreateFailed","message":"Failed to create Deployment.apps/route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"RoleBindingCreateFailed","message":"Failed to create RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:54Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/route-controller-manager-sa -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:54Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-creating-route-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:54Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-creating-route-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:54Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/prometheus-k8s -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:54Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:54Z","reason":"ServiceCreated","message":"Created Service/route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-controller-manager-sa -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ConfigMapCreated","message":"Created configmap/openshift-service-ca-n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:ingress-to-route-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/openshift-global-ca -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:ingress-to-route-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-creating-openshift-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"DeploymentCreated","message":"Created Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-creating-openshift-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ServiceCreated","message":"Created Service/controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:deployer because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/prometheus-k8s -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:update-buildconfig-status because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:update-buildconfig-status because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:deployer because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.openshift-controller-manager.openshift-global-ca.configmap","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:image-trigger-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:image-trigger-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing changed from Unknown to True (\"Progressing: deployment/controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/controller-manager: updated replicas is 0, desired replicas is 1\\nProgressing: deployment/route-controller-manager: observed generation is 0, desired generation is 1.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: updated replicas is 0, desired replicas is 1\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 0, desired generation is 2.\"),Available changed from Unknown to False (\"Available: no pods available on any node.\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/controller-manager: updated replicas is 0, desired replicas is 1\\nProgressing: deployment/route-controller-manager: observed generation is 0, desired generation is 1.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: updated replicas is 0, desired replicas is 1\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 0, desired generation is 2.\" to \"Progressing: deployment/controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded message changed from \"All is well\" to \"OpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-role.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\" to \"Progressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded message changed from \"OpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-role.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \" to \"All is well\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:32Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.openshift-controller-manager.serving-cert.secret","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:32Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-route-controller-manager:\ncause by changes in data.openshift-route-controller-manager.serving-cert.secret","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:32Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/controller-manager -n openshift-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:32Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\" to \"Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:38:42Z","reason":"BackOff","message":"Back-off restarting failed container openshift-controller-manager-operator in pod openshift-controller-manager-operator-8565d84698-nsg74_openshift-controller-manager-operator(282bc9ff-1bc0-421b-9cd3-d88d7c5e5303)","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Created","message":"Created container: openshift-controller-manager-operator","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Started","message":"Started container openshift-controller-manager-operator","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b\" already present on machine","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001643615154764724015465 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:23Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-6467bdd544-n9745","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-6467bdd544 to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:23Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-6467bdd544-n9745 to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:26Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-6467bdd544 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:27Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-65bc99cdf7 to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:27Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-6467bdd544-n9745","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:27Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:27Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-65bc99cdf7-7rjbr","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:29Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-65bc99cdf7-7rjbr to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:31Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.40/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:31Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:37Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:37Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:37Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\" in 5.393s (5.393s including waiting). Image size: 589379637 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:38Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:38Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:38Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:38Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:41Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[-]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa failed: reason withheld\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:36:44Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[+]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa ok\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:37:34Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T10:37:43Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[-]etcd failed: reason withheld\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[+]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa ok\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000006634615154764724017323 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:29:36Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-799b6db4d7 to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:29:46Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-799b6db4d7-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:33:22Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-799b6db4d7-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:33:23Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:33:23Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-799b6db4d7-sdg4w","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:35:36Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-sdg4w to master-0","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:35:37Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:35:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.5/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:35:39Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:35:50Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:35:50Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:03Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:04Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\" in 483ms (483ms including waiting). Image size: 512273539 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:05Z","reason":"LeaderElection","message":"openshift-apiserver-operator-799b6db4d7-sdg4w_14bd7bae-75ff-4264-931c-e365199b65ea became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:05Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:06Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:06Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:06Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:08Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:08Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n  }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:08Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:08Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:08Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:08Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:09Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/etcd-serving-ca -n openshift-apiserver: namespaces \"openshift-apiserver\" not found","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:10Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \\nAuditPolicyDegraded: namespaces \\\"openshift-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \\nAuditPolicyDegraded: namespaces \\\"openshift-apiserver\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:10Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-apiserver: namespaces \"openshift-apiserver\" not found","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \\nAuditPolicyDegraded: namespaces \\\"openshift-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:10Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:10Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:11Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \\nAuditPolicyDegraded: namespaces \\\"openshift-apiserver\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \\nAuditPolicyDegraded: namespaces \\\"openshift-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:11Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \\nAuditPolicyDegraded: namespaces \\\"openshift-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:16Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:22Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"All is well\",Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:26Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:36:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\" already present on machine","type":"Normal"}]}events/openshift-cluster-olm-operator.json0000640000000000000000000005767715154764724017600 0ustar0000000000000000{"items":[{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:29:33Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-olm-operator-77899cf6d to 1","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:29:43Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-olm-operator-77899cf6d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:33:22Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-olm-operator-77899cf6d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:33:23Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:33:23Z","reason":"SuccessfulCreate","message":"Created pod: cluster-olm-operator-77899cf6d-kh9h2","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:35:36Z","reason":"Scheduled","message":"Successfully assigned openshift-cluster-olm-operator/cluster-olm-operator-77899cf6d-kh9h2 to master-0","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:35:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.9/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:35:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:35:48Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:35:48Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:02Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:03Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:03Z","reason":"Started","message":"Started container copy-catalogd-manifests","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:03Z","reason":"Created","message":"Created container: copy-catalogd-manifests","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:03Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783\" in 604ms (604ms including waiting). Image size: 448041621 bytes.","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:08Z","reason":"Created","message":"Created container: copy-operator-controller-manifests","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:08Z","reason":"Started","message":"Started container copy-operator-controller-manifests","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:08Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:08Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc\" in 4.189s (4.189s including waiting). Image size: 495064829 bytes.","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:12Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6\" in 3.269s (3.269s including waiting). Image size: 511164376 bytes.","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"LeaderElection","message":"cluster-olm-operator-77899cf6d-kh9h2_8f31e5da-eb25-4e37-970a-f0d39588d796 became leader","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/operator-controller-manager-role -n openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/catalogd-manager-role -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"OperatorVersionChanged","message":"clusteroperator/olm version \"operator\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-catalogd because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"\" \"namespaces\" \"\" \"openshift-cluster-olm-operator\"} {\"operator.openshift.io\" \"olms\" \"\" \"cluster\"}] to [{\"\" \"namespaces\" \"\" \"openshift-catalogd\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"clustercatalogs.olm.operatorframework.io\"} {\"\" \"serviceaccounts\" \"openshift-catalogd\" \"catalogd-controller-manager\"} {\"rbac.authorization.k8s.io\" \"roles\" \"openshift-catalogd\" \"catalogd-leader-election-role\"} {\"rbac.authorization.k8s.io\" \"roles\" \"openshift-config\" \"catalogd-manager-role\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"catalogd-manager-role\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"catalogd-metrics-reader\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"catalogd-proxy-role\"} {\"rbac.authorization.k8s.io\" \"rolebindings\" \"openshift-catalogd\" \"catalogd-leader-election-rolebinding\"} {\"rbac.authorization.k8s.io\" \"rolebindings\" \"openshift-config\" \"catalogd-manager-rolebinding\"} {\"rbac.authorization.k8s.io\" \"clusterrolebindings\" \"\" \"catalogd-manager-rolebinding\"} {\"rbac.authorization.k8s.io\" \"clusterrolebindings\" \"\" \"catalogd-proxy-rolebinding\"} {\"\" \"configmaps\" \"openshift-catalogd\" \"catalogd-trusted-ca-bundle\"} {\"\" \"services\" \"openshift-catalogd\" \"catalogd-service\"} {\"apps\" \"deployments\" \"openshift-catalogd\" \"catalogd-controller-manager\"} {\"olm.operatorframework.io\" \"clustercatalogs\" \"\" \"openshift-certified-operators\"} {\"olm.operatorframework.io\" \"clustercatalogs\" \"\" \"openshift-community-operators\"} {\"olm.operatorframework.io\" \"clustercatalogs\" \"\" \"openshift-redhat-marketplace\"} {\"olm.operatorframework.io\" \"clustercatalogs\" \"\" \"openshift-redhat-operators\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"catalogd-mutating-webhook-configuration\"} {\"\" \"namespaces\" \"\" \"openshift-operator-controller\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"clusterextensions.olm.operatorframework.io\"} {\"\" \"serviceaccounts\" \"openshift-operator-controller\" \"operator-controller-controller-manager\"} {\"rbac.authorization.k8s.io\" \"roles\" \"openshift-config\" \"operator-controller-manager-role\"} {\"rbac.authorization.k8s.io\" \"roles\" \"openshift-operator-controller\" \"operator-controller-leader-election-role\"} {\"rbac.authorization.k8s.io\" \"roles\" \"openshift-operator-controller\" \"operator-controller-manager-role\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"operator-controller-clusterextension-editor-role\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"operator-controller-clusterextension-viewer-role\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"operator-controller-extension-editor-role\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"operator-controller-extension-viewer-role\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"operator-controller-manager-role\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"operator-controller-metrics-reader\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"operator-controller-proxy-role\"} {\"rbac.authorization.k8s.io\" \"rolebindings\" \"openshift-config\" \"operator-controller-manager-rolebinding\"} {\"rbac.authorization.k8s.io\" \"rolebindings\" \"openshift-operator-controller\" \"operator-controller-leader-election-rolebinding\"} {\"rbac.authorization.k8s.io\" \"rolebindings\" \"openshift-operator-controller\" \"operator-controller-manager-rolebinding\"} {\"rbac.authorization.k8s.io\" \"clusterrolebindings\" \"\" \"operator-controller-manager-rolebinding\"} {\"rbac.authorization.k8s.io\" \"clusterrolebindings\" \"\" \"operator-controller-proxy-rolebinding\"} {\"\" \"configmaps\" \"openshift-operator-controller\" \"operator-controller-trusted-ca-bundle\"} {\"\" \"services\" \"openshift-operator-controller\" \"operator-controller-controller-manager-metrics-service\"} {\"apps\" \"deployments\" \"openshift-operator-controller\" \"operator-controller-controller-manager\"} {\"operator.openshift.io\" \"olms\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-cluster-olm-operator\"}],status.versions changed from [] to [{\"operator\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"CustomResourceDefinitionCreated","message":"Created CustomResourceDefinition.apiextensions.k8s.io/clusterextensions.olm.operatorframework.io because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"CustomResourceDefinitionCreated","message":"Created CustomResourceDefinition.apiextensions.k8s.io/clustercatalogs.olm.operatorframework.io because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/operator-controller-leader-election-role -n openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/operator-controller-controller-manager -n openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/catalogd-controller-manager -n openshift-catalogd because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/operator-controller-manager-role -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/catalogd-leader-election-role -n openshift-catalogd because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:14Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/catalogd-manager-role because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:14Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/operator-controller-clusterextension-editor-role because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:16Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/catalogd-metrics-reader because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:16Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/operator-controller-clusterextension-viewer-role because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:17Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/catalogd-proxy-role because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:17Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/operator-controller-extension-editor-role because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:21Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/operator-controller-extension-viewer-role because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:22Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/catalogd-leader-election-rolebinding -n openshift-catalogd because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/operator-controller-proxy-role because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/catalogd-manager-rolebinding because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"DeploymentCreated","message":"Created Deployment.apps/catalogd-controller-manager -n openshift-catalogd because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/operator-controller-manager-role because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/catalogd-manager-rolebinding -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/operator-controller-metrics-reader because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/operator-controller-manager-rolebinding because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Progressing message changed from \"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to act on changes\" to \"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to act on changes\\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to act on changes\",Available message changed from \"CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment\" to \"CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment\\nOperatorcontrollerDeploymentOperatorControllerControllerManagerAvailable: Waiting for Deployment\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Progressing message changed from \"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to act on changes\\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to act on changes\" to \"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods\\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to act on changes\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/catalogd-proxy-rolebinding because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/operator-controller-manager-rolebinding -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/catalogd-trusted-ca-bundle -n openshift-catalogd because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Progressing changed from Unknown to True (\"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to act on changes\"),Available changed from Unknown to False (\"CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment\")","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"DeploymentCreated","message":"Created Deployment.apps/operator-controller-controller-manager -n openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/operator-controller-leader-election-rolebinding -n openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"ServiceCreated","message":"Created Service/catalogd-service -n openshift-catalogd because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"MutatingWebhookConfigurationCreated","message":"Created MutatingWebhookConfiguration.admissionregistration.k8s.io/catalogd-mutating-webhook-configuration because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/operator-controller-manager-rolebinding -n openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:25Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/operator-controller-proxy-rolebinding because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/operator-controller-trusted-ca-bundle -n openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Progressing message changed from \"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods\\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to act on changes\" to \"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods\\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to deploy pods\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:26Z","reason":"ServiceCreated","message":"Created Service/operator-controller-controller-manager-metrics-service -n openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:28Z","reason":"MutatingWebhookConfigurationUpdated","message":"Updated MutatingWebhookConfiguration.admissionregistration.k8s.io/catalogd-mutating-webhook-configuration because it changed","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:36:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Progressing message changed from \"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods\\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to deploy pods\" to \"OperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to deploy pods\",Available message changed from \"CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment\\nOperatorcontrollerDeploymentOperatorControllerControllerManagerAvailable: Waiting for Deployment\" to \"OperatorcontrollerDeploymentOperatorControllerControllerManagerAvailable: Waiting for Deployment\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Created","message":"Created container: cluster-olm-operator","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6\" already present on machine","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Started","message":"Started container cluster-olm-operator","type":"Normal"}]}events/openshift-operator-controller.json0000640000000000000000000000564415154764724017500 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-controller","lastTimestamp":"2026-03-13T10:36:24Z","reason":"FailedCreate","message":"Error creating: pods \"operator-controller-controller-manager-6598bfb6c4-\" is forbidden: unable to validate against any security context constraint: provider \"privileged\": Forbidden: not usable by user or serviceaccount","type":"Warning"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-03-13T10:36:24Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-controller/operator-controller-controller-manager-6598bfb6c4-bg6zf to master-0","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-03-13T10:36:24Z","reason":"ScalingReplicaSet","message":"Scaled up replica set operator-controller-controller-manager-6598bfb6c4 to 1","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-03-13T10:36:24Z","reason":"SuccessfulCreate","message":"Created pod: operator-controller-controller-manager-6598bfb6c4-bg6zf","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-03-13T10:36:25Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"ca-certs\" : configmap \"operator-controller-trusted-ca-bundle\" not found","type":"Warning"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-03-13T10:36:32Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-03-13T10:36:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-03-13T10:36:32Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-03-13T10:36:32Z","reason":"LeaderElection","message":"operator-controller-controller-manager-6598bfb6c4-bg6zf_cbd5caf9-5850-44fd-bd7c-4801cab69738 became leader","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-03-13T10:36:32Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.38/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-03-13T10:38:46Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-03-13T10:38:50Z","reason":"Started","message":"Started container manager","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-03-13T10:38:50Z","reason":"Created","message":"Created container: manager","type":"Normal"}]}events/openshift-catalogd.json0000640000000000000000000000456515154764724015243 0ustar0000000000000000{"items":[{"namespace":"openshift-catalogd","lastTimestamp":"2026-03-13T10:36:24Z","reason":"Scheduled","message":"Successfully assigned openshift-catalogd/catalogd-controller-manager-7f8b8b6f4c-f46qd to master-0","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-03-13T10:36:24Z","reason":"SuccessfulCreate","message":"Created pod: catalogd-controller-manager-7f8b8b6f4c-f46qd","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-03-13T10:36:24Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalogd-controller-manager-7f8b8b6f4c to 1","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-03-13T10:36:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"catalogserver-certs\" : secret \"catalogserver-cert\" not found","type":"Warning"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-03-13T10:36:32Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.37/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-03-13T10:36:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-03-13T10:36:32Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-03-13T10:36:32Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-03-13T10:36:33Z","reason":"LeaderElection","message":"catalogd-controller-manager-7f8b8b6f4c-f46qd_2377ab69-b692-4830-bdf4-dab102e7adf5 became leader","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-03-13T10:38:48Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783\" already present on machine","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-03-13T10:38:50Z","reason":"Created","message":"Created container: manager","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-03-13T10:38:50Z","reason":"Started","message":"Started container manager","type":"Normal"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000007671015154764724020221 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:29:35Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-5c74bfc494 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:29:45Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-5c74bfc494-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:33:22Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-5c74bfc494-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:33:25Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:33:25Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-5c74bfc494-dpslh","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:36Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-dpslh to master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.14/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:47Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:50Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" in 3.233s (3.233s including waiting). Image size: 506394574 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-5c74bfc494-dpslh_ad190583-6758-4300-be0d-f51106cd7076 became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:59Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:35:59Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:01Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:01Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:01Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:07Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:07Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:07Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:07Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:08Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:11Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:17Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:17Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:22Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:26Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:26Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:27Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:27Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:27Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:27Z","reason":"StartingNewRevision","message":"new revision 4 triggered by \"required configmap/kube-scheduler-pod has changed,required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:34Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:36Z","reason":"SecretCreated","message":"Created Secret/serving-cert-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:37Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:38Z","reason":"RevisionTriggered","message":"new revision 4 triggered by \"required configmap/kube-scheduler-pod has changed,required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:36:43Z","reason":"PodCreated","message":"Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:38:42Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000000703315154764724016360 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:12Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.32/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:12Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:12Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:12Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:23Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:31Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.39/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:31Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:32Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:32Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:33Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.42/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:38Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:38Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:41Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:45Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.45/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:45Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:45Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T10:36:45Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000011641015154764724022026 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:29:35Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-86d7cdfdfb to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:29:45Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-86d7cdfdfb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:33:22Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-86d7cdfdfb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:33:25Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:33:25Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-86d7cdfdfb-px9bl","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:36Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-controller-manager-operator/kube-controller-manager-operator-86d7cdfdfb-px9bl to master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.25/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:49Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:35:49Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:02Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:03Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" in 599ms (599ms including waiting). Image size: 508888174 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:04Z","reason":"LeaderElection","message":"kube-controller-manager-operator-86d7cdfdfb-px9bl_e7e9b3b4-2ea1-464a-a984-3af974dd25db became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:04Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:04Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:04Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:05Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:05Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:06Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:07Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:07Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:08Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:08Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:08Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:09Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:09Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:09Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:09Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:09Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:10Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:10Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-tmrvl\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:10Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:10Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:10Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:10Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:12Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n  \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-tmrvl\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n  \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n  \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:14Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:17Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:21Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:26Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:31Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:34Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:36Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:37Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:39Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:40Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:41Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:41Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/csr-controller-ca -n openshift-config-managed:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:41Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:41Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:41Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:41Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:43Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:45Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:46Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:36:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000000147615154764724020202 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T10:36:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.47/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T10:36:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T10:36:47Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T10:36:47Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215154764724016377 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-13T10:36:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.46/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-13T10:36:46Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-13T10:36:46Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-13T10:36:47Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000016511315154764724020237 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:29:50Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-68bd585b to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:29:51Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-68bd585b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:33:22Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-68bd585b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:33:25Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:33:25Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-68bd585b-vqdk8","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:36Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-vqdk8 to master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.16/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:37Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:37Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:38Z","reason":"LeaderElection","message":"kube-apiserver-operator-68bd585b-vqdk8_1f3b286d-8577-4c58-958e-c0a246d60b66 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:38Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:39Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:39Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:39Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:39Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:39Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:39Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:39Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:40Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:41Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:41Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:43Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:43Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:43Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:43Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:43Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:43Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:44Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:44Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:44Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:44Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:44Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:44Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:44Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:45Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:45Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:46Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:46Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:46Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:47Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:47Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:47Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:47Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:48Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:48Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:48Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:48Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:49Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:49Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:49Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:49Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:50Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:50Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:51Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:51Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:51Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:51Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:51Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:51Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:51Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:51Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:01Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:07Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:07Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: EvaluationConditionsDetected changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:12Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:16Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:16Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:16Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:16Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:16Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:17Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:22Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable message changed from \"All is well\" to \"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:26Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:32Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:34Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:35Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-apiserver:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:35Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:36Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-apiserver-client-ca -n openshift-config-managed:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:37Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:37Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:41Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:44Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:44Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/kubelet-serving-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:44Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kubelet-serving-ca -n openshift-config-managed:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:45Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:36:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:38:42Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001306115154764724014373 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:36:13Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.34/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:36:13Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:36:14Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:36:14Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:36:48Z","reason":"StaticPodInstallerCompleted","message":"Successfully installed revision 1","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:36:48Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:01Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:01Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:01Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:15Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:16Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:16Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:29Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:30Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:30Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:44Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:44Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:44Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:44Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:44Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:44Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:44Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:44Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:45Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T10:37:45Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000003746615154764724016243 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:29:38Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-5884b9cd56 to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:29:48Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-5884b9cd56-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:33:22Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-5884b9cd56-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:33:24Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-5884b9cd56-df8wr","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:33:25Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:36Z","reason":"Scheduled","message":"Successfully assigned openshift-etcd-operator/etcd-operator-5884b9cd56-df8wr to master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.17/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:46Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:50Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" in 3.97s (3.97s including waiting). Image size: 518384455 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"LeaderElection","message":"etcd-operator-5884b9cd56-df8wr_874a8fc9-dc46-4654-87fa-8a9cedead133 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nClusterMemberControllerDegraded: could not get list of unhealthy members: getting cache client could not retrieve endpoints: node lister not synced\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded changed from Unknown to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"EtcdEndpointsErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"ScriptControllerErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"EnvVarControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"DefragControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:36:00Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:36:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:36:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:36:01Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:36:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:36:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:36:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:36:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:36:07Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:38:09Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.17:8443/healthz\": dial tcp 10.128.0.17:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:38:09Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.17:8443/healthz\": dial tcp 10.128.0.17:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T10:38:43Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000477215154764724016603 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T10:36:21Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-778fb45b4 to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T10:36:23Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-778fb45b4-65f7b to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T10:36:23Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-778fb45b4-65f7b","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T10:36:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T10:36:32Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.35/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T10:36:32Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T10:36:37Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\" in 5.241s (5.241s including waiting). Image size: 505344964 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T10:36:37Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T10:36:37Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T10:36:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T10:36:38Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T10:36:38Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000333215154764724015126 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-03-13T10:38:57Z","reason":"SuccessfulCreate","message":"Created pod: router-default-79f8cd6fdd-b4x54","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-13T10:38:57Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-79f8cd6fdd to 1","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-13T10:40:02Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032\"","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-13T10:40:05Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032\" in 2.651s (2.651s including waiting). Image size: 487151732 bytes.","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-13T10:40:05Z","reason":"Created","message":"Created container: router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-13T10:40:05Z","reason":"Started","message":"Started container router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-13T10:40:15Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-13T10:40:16Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [-]backend-http failed: reason withheld\n[-]has-synced failed: reason withheld\n[+]process-running ok\nhealthz check failed\n\n","type":"Warning"}]}events/openshift-authentication-operator.json0000640000000000000000000021431615154764724020332 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:29:37Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-7c6989d6c4 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:29:48Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-7c6989d6c4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:33:22Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-7c6989d6c4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:33:23Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-7c6989d6c4-cwlxw","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:33:25Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:36Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-7c6989d6c4-cwlxw to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.8/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:47Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:50Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\" in 3.239s (3.239s including waiting). Image size: 513220825 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:51Z","reason":"LeaderElection","message":"authentication-operator-7c6989d6c4-cwlxw_34e1fe40-dd7b-426f-8ecd-2094b3a13a31 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to False (\"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"),Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:54Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:54Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:54Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:54Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:54Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:54Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:54Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\\"oauthConfig\\\": map[string]any{\\n+ \\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+ \\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+ \\t\\t\\t\\\"templates\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+ \\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n+ \\t\\t\\\"serverArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+ \\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+ \\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+ \\t\\t},\\n+ \\t\\t\\\"servingInfo\\\": map[string]any{\\n+ \\t\\t\\t\\\"cipherSuites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:55Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+ \\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+ \\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:56Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-bqnh2\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:57Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-bqnh2\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:59Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:35:59Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:00Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:01Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:01Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:02Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:04Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:06Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:08Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:09Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:09Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:09Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:11Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:12Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:17Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:19Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:21Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"SystemServiceCAConfigDegraded: Config \\\"v4-0-config-system-service-ca\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.84.165:443/healthz\\\": dial tcp 172.30.84.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"SystemServiceCAConfigDegraded: Config \\\"v4-0-config-system-service-ca\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"SystemServiceCAConfigDegraded: Config \\\"v4-0-config-system-service-ca\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.84.165:443/healthz\\\": dial tcp 172.30.84.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"SystemServiceCAConfigDegraded: Config \\\"v4-0-config-system-service-ca\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.84.165:443/healthz\\\": dial tcp 172.30.84.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"SystemServiceCAConfigDegraded: Failed to get system serving cert secret \\\"v4-0-config-system-serving-cert\\\": secret \\\"v4-0-config-system-serving-cert\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.84.165:443/healthz\\\": dial tcp 172.30.84.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"SystemServiceCAConfigDegraded: Failed to get system serving cert secret \\\"v4-0-config-system-serving-cert\\\": secret \\\"v4-0-config-system-serving-cert\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.84.165:443/healthz\\\": dial tcp 172.30.84.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"SystemServiceCAConfigDegraded: Failed to get system serving cert secret \\\"v4-0-config-system-serving-cert\\\": secret \\\"v4-0-config-system-serving-cert\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.84.165:443/healthz\\\": dial tcp 172.30.84.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"SystemServiceCAConfigDegraded: Failed to get system serving cert secret \\\"v4-0-config-system-serving-cert\\\": secret \\\"v4-0-config-system-serving-cert\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.84.165:443/healthz\\\": dial tcp 172.30.84.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.84.165:443/healthz\\\": dial tcp 172.30.84.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:42Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:42Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:42Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:42Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.84.165:443/healthz\\\": dial tcp 172.30.84.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.84.165:443/healthz\\\": dial tcp 172.30.84.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.84.165:443/healthz\\\": dial tcp 172.30.84.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.84.165:443/healthz\\\": dial tcp 172.30.84.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:36:46Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:37:23Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.8:8443/healthz\": dial tcp 10.128.0.8:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:37:23Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.8:8443/healthz\": dial tcp 10.128.0.8:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:37:53Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:37:53Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T10:37:53Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\" already present on machine","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015154764724016307 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-13T10:38:55Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-13T10:38:55Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003543715154764710014626 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":345,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-config-server","secrets":1},{"name":"machine-os-builder","secrets":1},{"name":"machine-os-puller","secrets":1},{"name":"node-bootstrapper","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-state-metrics","secrets":1},{"name":"metrics-server","secrets":1},{"name":"node-exporter","secrets":1},{"name":"openshift-state-metrics","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1},{"name":"telemeter-client","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015154764710014105 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000000672015154764675014562 0ustar0000000000000000Mar 13 10:40:01.510039 master-0 kubenswrapper[7271]: E0313 10:40:01.509958 7271 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="253196c1-ea2c-4382-b0fc-c56a8d919b9a" containerName="kube-rbac-proxy" Mar 13 10:40:01.510039 master-0 kubenswrapper[7271]: E0313 10:40:01.510002 7271 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="253196c1-ea2c-4382-b0fc-c56a8d919b9a" containerName="machine-approver-controller" Mar 13 10:40:01.660329 master-0 kubenswrapper[7271]: E0313 10:40:01.660117 7271 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"f96c55f0c8dd3816027168f6f216080d8a9d8cd7f31fcfc7f77723e69489e511\": container with ID starting with f96c55f0c8dd3816027168f6f216080d8a9d8cd7f31fcfc7f77723e69489e511 not found: ID does not exist" containerID="f96c55f0c8dd3816027168f6f216080d8a9d8cd7f31fcfc7f77723e69489e511" Mar 13 10:40:01.660468 master-0 kubenswrapper[7271]: E0313 10:40:01.660374 7271 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"f719882dc495b29409a4eba28a794b5bdb47eb164a7db5c0e50970280a97169b\": container with ID starting with f719882dc495b29409a4eba28a794b5bdb47eb164a7db5c0e50970280a97169b not found: ID does not exist" containerID="f719882dc495b29409a4eba28a794b5bdb47eb164a7db5c0e50970280a97169b" Mar 13 10:40:07.653491 master-0 kubenswrapper[7271]: E0313 10:40:07.653399 7271 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e9f64995-fa1e-4205-981b-be7a7ae67115" containerName="config-sync-controllers" Mar 13 10:40:07.653491 master-0 kubenswrapper[7271]: E0313 10:40:07.653434 7271 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e9f64995-fa1e-4205-981b-be7a7ae67115" containerName="kube-rbac-proxy" Mar 13 10:40:07.653491 master-0 kubenswrapper[7271]: E0313 10:40:07.653457 7271 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e9f64995-fa1e-4205-981b-be7a7ae67115" containerName="cluster-cloud-controller-manager" Mar 13 10:40:07.785299 master-0 kubenswrapper[7271]: E0313 10:40:07.784947 7271 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"f81f14d4e508ef7bb256b9171576d4f57c00af38311bc455e2ccda7164e68c43\": container with ID starting with f81f14d4e508ef7bb256b9171576d4f57c00af38311bc455e2ccda7164e68c43 not found: ID does not exist" containerID="f81f14d4e508ef7bb256b9171576d4f57c00af38311bc455e2ccda7164e68c43" Mar 13 10:40:07.785842 master-0 kubenswrapper[7271]: E0313 10:40:07.785816 7271 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"100dfc2be2e7846e0324dc10f52c0efd8b4389ad704a75ee7c820a85797892d7\": container with ID starting with 100dfc2be2e7846e0324dc10f52c0efd8b4389ad704a75ee7c820a85797892d7 not found: ID does not exist" containerID="100dfc2be2e7846e0324dc10f52c0efd8b4389ad704a75ee7c820a85797892d7" Mar 13 10:40:07.789822 master-0 kubenswrapper[7271]: E0313 10:40:07.789753 7271 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"9ece2d430c9cce48e1f930f8ad614c56dda2379c76f4e983342353f18c6e0d32\": container with ID starting with 9ece2d430c9cce48e1f930f8ad614c56dda2379c76f4e983342353f18c6e0d32 not found: ID does not exist" containerID="9ece2d430c9cce48e1f930f8ad614c56dda2379c76f4e983342353f18c6e0d32"aggregated/unused_machine_configs_count.json0000640000000000000000000000004215154764675020154 0ustar0000000000000000{"unused_machineconfigs_count":21}config/machineconfigs/rendered-worker-5397bc4c9c199499d943d81493af23d5.json0000640000000000000000000004054015154764675023677 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"d4eb710b17481f468c73d93c876a385253a863e0","machineconfiguration.openshift.io/release-image-version":"4.18.34"},"creationTimestamp":"2026-03-13T10:40:07Z","generation":1,"name":"rendered-worker-5397bc4c9c199499d943d81493af23d5","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"worker","uid":"7bbe252b-b2e7-47d3-8b83-e48b93fbdf9a"}],"resourceVersion":"10079","uid":"d8c7e41f-4055-4a0f-8564-26e4246ee603"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:25968f175e97edd03d85d1cdff3b3d2de25e08c55e75d18285788b825a35e3f3","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/worker,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n --cloud-provider= \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1d605384f31a8085f78a96145c2c3dc51afe22721144196140a2699b7c07ebe3 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bfcd8017eede3fb66fa3f5b47c27508b787d38455689154461f0e6a5dc303ff \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"}]}},"extensions":[],"fips":false,"kernelArguments":["systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:488c7559709f4747b9cc29de1db18038270193dc7acdb546c94a33dc077504e2"}}config/machineconfigs/rendered-master-262c9aa90bf73215b74fa7b8b7e6ac94.json0000640000000000000000000004333015154764675024127 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"d4eb710b17481f468c73d93c876a385253a863e0","machineconfiguration.openshift.io/release-image-version":"4.18.34"},"creationTimestamp":"2026-03-13T10:40:07Z","generation":1,"name":"rendered-master-262c9aa90bf73215b74fa7b8b7e6ac94","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"master","uid":"468643cf-7f39-4ab3-8586-2d93c6791303"}],"resourceVersion":"10082","uid":"d2f5fafd-2532-4292-8c06-70abc0faa0fa"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:25968f175e97edd03d85d1cdff3b3d2de25e08c55e75d18285788b825a35e3f3","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"disks":[{"device":"/dev/vdc","wipeTable":true},{"device":"/dev/vdd","wipeTable":true},{"device":"/dev/vde","wipeTable":true}],"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/control-plane,node-role.kubernetes.io/master,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --cloud-provider= \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --register-with-taints=node-role.kubernetes.io/master=:NoSchedule \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1d605384f31a8085f78a96145c2c3dc51afe22721144196140a2699b7c07ebe3 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bfcd8017eede3fb66fa3f5b47c27508b787d38455689154461f0e6a5dc303ff \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"},{"contents":"# See https://github.com/openshift/machine-config-operator/issues/1897\n[Service]\nNice=10\nIOSchedulingClass=best-effort\nIOSchedulingPriority=6\n","name":"mco-controlplane-nice.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"},{"contents":"[Unit]\nDescription=Run dnsmasq to provide local dns for Single Node OpenShift\nBefore=kubelet.service crio.service\nAfter=network.target ovs-configuration.service\n\n[Service]\nTimeoutStartSec=30\nExecStartPre=/usr/local/bin/dnsmasq_config.sh\nExecStart=/usr/sbin/dnsmasq -k\nRestart=always\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"dnsmasq.service"},{"enabled":true,"name":"iscsid.service"},{"contents":"[Unit]\nDescription=Create logical volume with name cinder-volumes.\nAfter=var.mount systemd-udev-settle.service\n\n[Service]\nType=oneshot\nExecCondition=/bin/bash -c '! /usr/sbin/vgdisplay cinder-volumes'\nExecStartPre=/usr/sbin/pvcreate /dev/vdc /dev/vdd /dev/vde\nExecStart=/usr/sbin/vgcreate cinder-volumes /dev/vdc /dev/vdd /dev/vde\nRemainAfterExit=yes\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"lv-cinder-volumes.service"},{"enabled":true,"name":"multipathd.service"}]}},"extensions":[],"fips":false,"kernelArguments":["net.ifnames=0","systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:488c7559709f4747b9cc29de1db18038270193dc7acdb546c94a33dc077504e2"}}aggregated/ingress_controllers_certs.json0000640000000000000000000000045715154764675017557 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-03-13T10:38:50Z","not_after":"2028-03-12T10:38:51Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-03-13T10:38:54Z","not_after":"2028-03-12T10:38:55Z","controllers":[]}]config/clusteroperator/storage.json0000640000000000000000000000346615154764675016336 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"d5d2202c-3cb1-4269-a294-424d87e779f0","resourceVersion":"9781","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:39:59Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:39:59Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:39:59Z","reason":"AsExpected","message":"DefaultStorageClassControllerAvailable: No default StorageClass for this platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:39:59Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T10:39:59Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315154764675016702 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"8f360dec-f261-4086-aadf-edbcdfc1592f","resourceVersion":"5783","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:36:10Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:36:21Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:36:12Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:36:12Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T10:36:09Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000307615154764675024707 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"59a8f05f-c99a-406c-b1e8-1bd04d2f021f","resourceVersion":"9260","generation":1,"creationTimestamp":"2026-03-13T10:29:21Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:38:54Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T10:38:54Z","reason":"ClusterServiceVersionNotSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Failed with reason: NoOperatorGroup, message: csv in namespace with no operatorgroups"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T10:39:28Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:38:55Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255515154764675023500 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"93e99081-8b94-4105-8e0a-1a4b720e925c","resourceVersion":"9100","generation":1,"creationTimestamp":"2026-03-13T10:29:21Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:38:54Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:39:25Z","message":"Deployed 4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:38:54Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:38:54Z"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115154764675022064 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"bea9f466-5cb6-4b96-9e4b-918d56079335","resourceVersion":"8402","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:38:54Z","message":"Deployed 4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:38:54Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:38:54Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:38:54Z"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315154764675020326 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"c6019196-abf6-4b84-8ab4-18677c15ccf7","resourceVersion":"816","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000430415154764675022452 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"319d0020-cd45-47cd-ac2d-23c8c65b79d9","resourceVersion":"6565","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:35:52Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T10:35:56Z","reason":"_DesiredStateNotYetAchieved","message":"Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T10:35:56Z","reason":"_NoPodsAvailable","message":"Available: no pods available on any node."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:35:56Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T10:35:52Z","reason":"NoData"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000000615715154764675020667 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"96ae0a95-dbd9-462d-be8e-4bca3b390b69","resourceVersion":"6339","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:36:06Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T10:36:23Z","reason":"APIServerDeployment_PodsUpdating","message":"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T10:36:06Z","reason":"APIServerDeployment_NoPod::APIServices_PreconditionNotReady","message":"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\nAPIServicesAvailable: PreconditionNotReady"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:36:06Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T10:36:06Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001467515154764675015465 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"e767e7b6-9b79-4673-b722-c3d2231b5abf","resourceVersion":"7148","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:36:13Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T10:36:24Z","reason":"OperatorcontrollerDeploymentOperatorControllerControllerManager_Deploying","message":"OperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to deploy pods"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T10:36:24Z","reason":"OperatorcontrollerDeploymentOperatorControllerControllerManager_Deploying","message":"OperatorcontrollerDeploymentOperatorControllerControllerManagerAvailable: Waiting for Deployment"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:36:13Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T10:36:13Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115154764675017110 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"f1dbd125-3172-4a55-bbe4-1d80c7dc5fee","resourceVersion":"6679","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:36:33Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.34\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:36:34Z","reason":"AsExpected","message":"Cluster version is \"4.18.34\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:36:32Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.34"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003652615154764675016366 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"7fc774ac-d677-4694-886c-f3967f82d618","resourceVersion":"4986","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-03-13T10:34:29Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:34:17Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:34:17Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T10:34:29Z","reason":"Deploying","message":"DaemonSet \"/openshift-multus/network-metrics-daemon\" is waiting for other operators to become ready\nDeployment \"/openshift-multus/multus-admission-controller\" is waiting for other operators to become ready"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:35:48Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715154764675017054 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"84a1d204-ec8b-480e-82e3-37ec7e43dd4e","resourceVersion":"8282","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-03-13T10:38:50Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-03-13T10:38:50Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T10:38:54Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:38:50Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315154764675017151 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"a1cbf753-ee85-4551-b553-889fd07f1257","resourceVersion":"7878","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:38:51Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.34"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:38:51Z","reason":"OperatorAvailable","message":"Available release version: 4.18.34"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:38:51Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:38:51Z","reason":"OperatorAvailable","message":"Available release version: 4.18.34"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000546315154764675017540 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"d7da8817-e533-49bc-a80b-aa84d62bd799","resourceVersion":"10545","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:40:29Z","message":"Cluster version is 4.18.34"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:40:23Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:40:07Z","reason":"AsExpected","message":"Cluster has deployed [{operator 4.18.34} {operator-image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c}]"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:40:07Z","reason":"AsExpected"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-13T10:40:07Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"operator-image","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"operator.openshift.io","resource":"machineconfigurations","name":""},{"group":"","resource":"nodes","name":""},{"group":"","resource":"namespaces","name":"openshift-kni-infra"},{"group":"","resource":"namespaces","name":"openshift-openstack-infra"},{"group":"","resource":"namespaces","name":"openshift-ovirt-infra"},{"group":"","resource":"namespaces","name":"openshift-vsphere-infra"},{"group":"","resource":"namespaces","name":"openshift-nutanix-infra"},{"group":"","resource":"namespaces","name":"openshift-cloud-platform-infra"}],"extension":{"master":"all 1 nodes are at latest configuration rendered-master-262c9aa90bf73215b74fa7b8b7e6ac94","worker":"all 0 nodes are at latest configuration rendered-worker-5397bc4c9c199499d943d81493af23d5"}}}config/clusteroperator/machine-approver.json0000640000000000000000000000253215154764675020123 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"e51a8216-f04d-43bb-ab6c-f269e4a40571","resourceVersion":"9702","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:39:58Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.34"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:39:58Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:39:58Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:39:58Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371315154764675017040 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"cce533f8-4645-40eb-85f0-85751d8164dc","resourceVersion":"9703","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:39:58Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:39:58Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:39:58Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:39:58Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315154764675022561 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"468efe52-9a63-4055-bed4-e861197ce7c8","resourceVersion":"5259","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:36:03Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:36:09Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:36:09Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:36:03Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T10:36:03Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615154764675017571 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"3bd5fcea-8a54-400e-9e4e-fff743cd76f1","resourceVersion":"6853","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:35:53Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T10:36:08Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T10:35:54Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:35:53Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T10:35:53Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715154764675021412 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"c745902b-ff2e-4ecc-ad7e-789fada55976","resourceVersion":"6900","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:36:04Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T10:36:43Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T10:36:04Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:36:04Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T10:36:04Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715154764675017617 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"301c76dc-60d5-4dd5-ba29-cd9e741d2b6c","resourceVersion":"6844","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:35:41Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T10:36:41Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T10:35:43Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:35:40Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-13T10:36:08Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000141415154764675016511 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"35b3ebd1-85ec-4458-8b40-2d1e21f48333","resourceVersion":"834","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/ingress.json0000640000000000000000000000456715154764675016347 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"37299f07-06e9-4ef3-8524-72b8c3646105","resourceVersion":"8666","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:38:58Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T10:38:51Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:38:55Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:38:51Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-13T10:38:51Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715154764675017614 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"af55c030-9d01-4ef6-b238-94cc4a6d4f6d","resourceVersion":"784","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015154764675015606 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"4a86eaab-dc49-4c46-8c1a-6554c6d03cf3","resourceVersion":"5290","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:35:53Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T10:36:10Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T10:35:53Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:35:53Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T10:35:53Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515154764675015456 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"7e6dee5d-671e-4879-969f-06a6d651bf44","resourceVersion":"8662","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:38:57Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:38:57Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:38:57Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:36:32Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715154764675021460 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"86e1b488-eeeb-484d-bb37-837f5c87c646","resourceVersion":"8009","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:36:08Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:36:13Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:36:13Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:36:09Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T10:36:08Z","reason":"NoData"}],"versions":[{"name":"csi-snapshot-controller","version":"4.18.34"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515154764675021637 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"058ad02c-6c15-4ffc-9cfb-ccc97d6cbd49","resourceVersion":"9657","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:39:58Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:39:58Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:39:58Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:39:58Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215154764675016320 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"543dd84f-d3d6-479c-8541-40872b7ce3f2","resourceVersion":"849","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615154764675017760 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"f982809d-8b91-489a-b6b5-4dbeb99974af","resourceVersion":"5249","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:36:09Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:36:09Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:36:09Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:36:09Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T10:36:09Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.34"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000265715154764675020514 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"fc0b45b3-0665-4661-9c40-336d26ea4ebc","resourceVersion":"9704","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:39:58Z","reason":"AsExpected","message":"at version 4.18.34"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:39:58Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:39:58Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:39:58Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000002022415154764675020077 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"a2d3a6a8-676b-44ae-9d4b-3012548f518b","resourceVersion":"10153","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:39:59Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:39:59Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:39:59Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:39:59Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-gcp-ro-creds"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-iam-ro"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-azure-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-ccm"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ibm-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-nutanix-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-openstack-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-powervs-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000440115154764675021557 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"4a8902c6-9b28-49ee-a6fc-ec0ad371b6c6","resourceVersion":"9745","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"TrustedCABundleControllerControllerAvailable","status":"True","lastTransitionTime":"2026-03-13T10:39:59Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"TrustedCABundleControllerControllerDegraded","status":"False","lastTransitionTime":"2026-03-13T10:39:59Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"CloudConfigControllerAvailable","status":"True","lastTransitionTime":"2026-03-13T10:39:59Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"CloudConfigControllerDegraded","status":"False","lastTransitionTime":"2026-03-13T10:39:59Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:39:59Z","reason":"AsExpected","message":"Cluster Cloud Controller Manager Operator is available at 4.18.34"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:39:59Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:39:59Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:39:59Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"},{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427015154764675016620 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"c3f84a54-e51f-4b9c-93c6-b7b7ff55499a","resourceVersion":"9608","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:39:58Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:39:58Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:39:58Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:39:58Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-13T10:39:58Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000001050015154764675017674 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"2aa495f0-710d-429a-a5a0-841c0566bd17","resourceVersion":"7069","generation":1,"creationTimestamp":"2026-03-13T10:29:19Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:35:52Z","reason":"AsExpected","message":"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.84.165:443/healthz\": dial tcp 172.30.84.165:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOAuthServerConfigObservationDegraded: secret \"v4-0-config-system-router-certs\" not found\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \"v4-0-config-system-router-certs\" not found"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T10:36:46Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T10:35:52Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.84.165:443/healthz\": dial tcp 172.30.84.165:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T10:35:52Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T10:35:52Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"oauth-apiserver","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/pod/openshift-cluster-version/cluster-version-operator-8c9c967c7-xmpst.json0000640000000000000000000001341415154764675026764 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-8c9c967c7-xmpst","generateName":"cluster-version-operator-8c9c967c7-","namespace":"openshift-cluster-version","uid":"0ac1a605-d2d5-4004-96f5-121c20555bde","resourceVersion":"8838","creationTimestamp":"2026-03-13T10:38:57Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"8c9c967c7"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-8c9c967c7","uid":"fb5412a7-9473-4573-b301-ca9518909c1d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:39:02Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:39:00Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:39:02Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:39:02Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:59Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T10:39:00Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-03-13T10:39:02Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","containerID":"cri-o://9fa1a1f3dc431f4d1989376ade490c97b3ca19baaab0c502fea959b427739c54","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415154764675011046 0ustar0000000000000000389b7aaa-8003-44de-83e2-b4ead9c04b28config/version.json0000640000000000000000000000704415154764675013116 0ustar0000000000000000{"metadata":{"name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","resourceVersion":"10555","generation":2,"creationTimestamp":"2026-03-13T10:28:31Z"},"spec":{"clusterID":"389b7aaa-8003-44de-83e2-b4ead9c04b28","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.34","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","url":"https://access.redhat.com/errata/RHSA-2026:2977","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","fast-4.19","stable-4.18","stable-4.19"]},"history":[{"state":"Partial","startedTime":"2026-03-13T10:29:19Z","completionTime":null,"version":"4.18.34","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","verified":false}],"observedGeneration":2,"versionHash":"p13mOMOOYQo=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-03-13T10:29:19Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-03-13T10:29:19Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-03-13T10:29:19Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-03-13T10:29:19Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T10:29:19Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-03-13T10:39:29Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, etcd, image-registry, insights, kube-apiserver, kube-controller-manager, kube-scheduler, monitoring, olm, openshift-apiserver, openshift-controller-manager, openshift-samples, operator-lifecycle-manager-packageserver are not available\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 908): resource may have been deleted\n* Could not update oauthclient \"console\" (550 of 908): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (825 of 908): resource may have been deleted\n* Could not update role \"openshift-console/prometheus-k8s\" (829 of 908): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T10:29:19Z","reason":"MultipleErrors","message":"Unable to apply 4.18.34: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515154764675023241 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115154764675025451 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715154764675025160 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715154764675025151 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315154764675022271 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515154764675026725 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115154764675023430 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115154764675023224 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115154764675025514 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/running_containers.json0000640000000000000000000001252515154764675015336 0ustar0000000000000000{"images":{"0":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","1":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","10":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","11":"sha256:3888758fa24689d4e63dfb78ed97a852c687295adcabdabf8cdc4a2beaa42398","12":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","13":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","14":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","15":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","16":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","17":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","18":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","19":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","2":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","20":"sha256:d470dba32064cc62b2ab29303d6e00612304548262eaa2f4e5b40a00a26f71ce","21":"sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","22":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","23":"sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06","24":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","25":"sha256:bc516f6eb3028f5169f1712ac1878d4b591174fd7c363f4ee5aa63162aa01b0e","26":"sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245","27":"sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","28":"sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626","29":"sha256:ebee49810f493f9b566740bd61256fd40b897cc51423f1efa01a02bb57ce177d","3":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","30":"sha256:bececf32872455775075a3d35100302396ca58ae29827b24d7df086d8ac14432","31":"sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9","32":"sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032","33":"sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","34":"registry.redhat.io/redhat/certified-operator-index:v4.18","35":"sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955","36":"sha256:b8cb5e0caeca0fb02f3e8c72b7ddf1c49e3c602e42e119ba30c60525f1db1821","37":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","38":"sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d","39":"sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","4":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","40":"sha256:b714a7ada1e295b599b432f32e1fd5b74c8cdbe6fe51e95306322b25cb873914","41":"sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7","42":"sha256:243ce0f08a360370edf4960aec94fc6c5be9d4aae26cf8c5320adcd047c1b14f","43":"sha256:9bd0b71d620cf0acbfcd1b58797dc30050bd167cb6b7a7f62c8333dd370c76d5","44":"sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916","45":"sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","46":"sha256:28f33d62fd0b94c5ea0ebcd7a4216848c8dd671a38d901ce98f4c399b700e1c7","47":"sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","48":"sha256:2508a5f66e509e813cb09825b5456be91b4cdd4d02f470f22a33de42c753f2b7","49":"sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","5":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","50":"sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7","51":"registry.redhat.io/redhat/redhat-operator-index:v4.18","52":"sha256:042e6a37747405da54cf91543d44408c9531327a2cce653c41ca851aa7c896d8","53":"sha256:b9b8bc43bac294be3c7669cde049e388ad9d8751242051ba40f83e1c401eceda","54":"sha256:3ef4b76f6b989bf3e802d22aff457a019d9c232f0ea8d927ac6ce2d854fe48d7","55":"sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1","56":"sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3","57":"sha256:00b591b3820682dc99f16f07a3a0a4ec06dfedba63cd0f79b998ac4509fabea3","58":"sha256:3bedf16a5f527126e934c37d2f24886de4a54c9bd9d45b18821d02eefd8b5f9e","59":"sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","6":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","60":"registry.redhat.io/redhat/community-operator-index:v4.18","61":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","62":"sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e","63":"sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","7":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","8":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","9":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba"},"containers":{"2026-03":{"0":23,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":2,"17":2,"18":2,"19":2,"2":8,"20":2,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":6,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":4,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"49":1,"5":4,"50":1,"51":1,"52":1,"53":1,"54":1,"55":1,"56":1,"57":1,"58":1,"59":1,"6":4,"60":1,"61":1,"62":1,"63":1,"7":3,"8":3,"9":2}}}config/pod/openshift-network-operator/network-operator-7c649bf6d4-6vpl4.json0000640000000000000000000002515415154764675025427 0ustar0000000000000000{"metadata":{"name":"network-operator-7c649bf6d4-6vpl4","generateName":"network-operator-7c649bf6d4-","namespace":"openshift-network-operator","uid":"1d5f5440-b10c-40ea-9f1a-5f03babc1bd9","resourceVersion":"7395","creationTimestamp":"2026-03-13T10:33:25Z","labels":{"name":"network-operator","pod-template-hash":"7c649bf6d4"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-7c649bf6d4","uid":"8b55f24e-1460-4524-b2a5-ebe632bf64e8","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-8rfpp","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9242604e78efada5aeb232d73a7963f806b754213f5d92b1dffc9b493d7b5a65"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b19b9d0e5437b0bb19cafc3fb516f654c911cdf11184c0de9a27b43c6b80c9ce"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3aa7c84e73a2a19cc9baca38b7e86dfcde579aa88221647c332c83f047d5ae6d"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5bfe4d3125d98cc501d5a529d3ae2497106a2bbb5a6dd06df7c0e0930d168212"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b62afe74fdcb011a4a8c8fa5572dbab2514dda673ae4be4c6beaef92d28216ba"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-8rfpp","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:33:33Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:33:25Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:33:25Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T10:33:25Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-03-13T10:38:43Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"apply / update (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0313 10:36:51.871416 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter\nI0313 10:36:51.871496 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0313 10:36:51.871534 1 log.go:245] reconciling (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script\nI0313 10:36:51.871656 1 log.go:245] could not apply (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: failed to apply / update (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: client rate limiter Wait returned an error: context canceled\nI0313 10:36:51.871703 1 log.go:245] reconciling (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter\nI0313 10:36:51.871825 1 log.go:245] could not apply (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: failed to apply / update (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0313 10:36:56.866820 1 observer_polling.go:162] Shutting down file observer\nI0313 10:37:21.868542 1 internal.go:550] \"Stopping and waiting for caches\"\nI0313 10:37:21.868802 1 internal.go:554] \"Stopping and waiting for webhooks\"\nI0313 10:37:21.868833 1 internal.go:557] \"Stopping and waiting for HTTP servers\"\nI0313 10:37:21.868860 1 internal.go:561] \"Wait completed, proceeding to shutdown the manager\"\nF0313 10:37:21.868501 1 operator.go:133] Failed to start controller-runtime manager: failed waiting for all runnables to end within grace period of 30s: context deadline exceeded\n","startedAt":"2026-03-13T10:34:16Z","finishedAt":"2026-03-13T10:37:21Z","containerID":"cri-o://5e2eaafddd132326dc9e3d7a39739553509b59eb3a4133fcdb22787eb5fde49c"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","containerID":"cri-o://4d75e74c4df786ae928889ac54113d7b673c3ebf79a2a08a34f9fbe9b63c1453","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-8rfpp","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-9z8mk.json0000640000000000000000000002463415154764675025702 0ustar0000000000000000{"metadata":{"name":"network-node-identity-9z8mk","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"f87662b9-6ac6-44f3-8a16-ff858c2baa91","resourceVersion":"7398","creationTimestamp":"2026-03-13T10:34:52Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"68cb6fd5b","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"0158a2c0-7ce2-4e6c-bc38-87444ec39af2","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-zk4sg","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-zk4sg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-zk4sg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:17Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:34:52Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:44Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:34:52Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T10:34:52Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-03-13T10:38:43Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-wh4fr\"} reason=\"CSRApproved\"\nI0313 10:35:30.642850 1 approver.go:230] Finished syncing CSR csr-wh4fr for master-0 node in 9.787152ms\nI0313 10:35:30.643095 1 approver.go:230] Finished syncing CSR csr-wh4fr for unknown node in 112.123µs\nI0313 10:35:30.652291 1 approver.go:230] Finished syncing CSR csr-wh4fr for unknown node in 105.413µs\nE0313 10:37:12.332408 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path\nE0313 10:37:27.331461 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0313 10:37:27.331507 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0313 10:37:42.332825 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0313 10:37:42.333145 1 ovnkubeidentity.go:309] error running approver: leader election lost\nI0313 10:37:42.333178 1 internal.go:538] \"Stopping and waiting for non leader election runnables\"\nI0313 10:37:42.333204 1 internal.go:542] \"Stopping and waiting for leader election runnables\"\nI0313 10:37:42.333216 1 internal.go:550] \"Stopping and waiting for caches\"\nI0313 10:37:42.333225 1 internal.go:554] \"Stopping and waiting for webhooks\"\n","startedAt":"2026-03-13T10:35:16Z","finishedAt":"2026-03-13T10:37:42Z","containerID":"cri-o://d2e7a9c17281b6d5f7f20fbe7b128af98dc009aec3115a4cb2ebd1a39090d634"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","containerID":"cri-o://7e21ba1a4a052f4311590e81daf7c7043a43eea8119ade6c511b95ed35202221","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-zk4sg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-03-13T10:35:16Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","containerID":"cri-o://91b11f9c708aeb26fa6add1f4edafa995c757f11a6ec8c0817b67e5809c9a88e","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-zk4sg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001521215154764675026276 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"25e53a04-a14b-4ee9-b349-4e1c97b9dd55","resourceVersion":"3914","creationTimestamp":"2026-03-13T10:33:29Z","labels":{"k8s-app":"kube-rbac-proxy-crio"},"annotations":{"kubernetes.io/config.hash":"e9add8df47182fc2eaf8cd78016ebe72","kubernetes.io/config.mirror":"e9add8df47182fc2eaf8cd78016ebe72","kubernetes.io/config.seen":"2026-03-13T10:32:41.926818244Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"cb006092-fd40-4d71-84fb-f3ba8c313f97","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:45Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:45Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:45Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:45Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:45Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T10:35:45Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T10:32:45Z","finishedAt":"2026-03-13T10:32:45Z","containerID":"cri-o://a6a13e582092662aa7c7eefb83f8515ba545374741aab1781847bd04e676290b"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://a6a13e582092662aa7c7eefb83f8515ba545374741aab1781847bd04e676290b","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-03-13T10:33:32Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0313 10:33:04.457065 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0313 10:33:04.457232 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0313 10:33:04.459939 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-03-13T10:33:04Z","finishedAt":"2026-03-13T10:33:04Z","containerID":"cri-o://609f0e5551a709b73298eb7117d146c048b1a886bac85012fa0f0c1a2a1cd687"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://9c670eb6abb5de03cd978fcc4efcfd81c65dafc0d610959d205735ca6df3ab91","started":true}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-677db989d6-tzd9b.json0000640000000000000000000002443015154764675025401 0ustar0000000000000000{"metadata":{"name":"ingress-operator-677db989d6-tzd9b","generateName":"ingress-operator-677db989d6-","namespace":"openshift-ingress-operator","uid":"7667717b-fb74-456b-8615-16475cb69e98","resourceVersion":"10601","creationTimestamp":"2026-03-13T10:33:25Z","labels":{"name":"ingress-operator","pod-template-hash":"677db989d6"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.23/23\"],\"mac_address\":\"0a:58:0a:80:00:17\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.23/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.23\"\n ],\n \"mac\": \"0a:58:0a:80:00:17\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-677db989d6","uid":"284563d0-adfb-49bb-a953-ff6e50f72dd7","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-qd2mn","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-qd2mn","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-qd2mn","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:50Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:40:53Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:40:53Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:35:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.23","podIPs":[{"ip":"10.128.0.23"}],"startTime":"2026-03-13T10:35:36Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-03-13T10:40:52Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"/runnable_group.go:226\tAll workers finished\t{\"controller\": \"error_page_configmap_controller\"}\n2026-03-13T10:40:51.025Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tShutdown signal received, waiting for all workers to finish\t{\"controller\": \"crl\"}\n2026-03-13T10:40:51.025Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tAll workers finished\t{\"controller\": \"crl\"}\n2026-03-13T10:40:51.027Z\tERROR\toperator.init\tcontroller/controller.go:263\tReconciler error\t{\"controller\": \"route_metrics_controller\", \"object\": {\"name\":\"default\",\"namespace\":\"openshift-ingress-operator\"}, \"namespace\": \"openshift-ingress-operator\", \"name\": \"default\", \"reconcileID\": \"20d999e3-db57-470a-9214-5f8b589c3515\", \"error\": \"failed to get Ingress Controller \\\"openshift-ingress-operator/default\\\": Timeout: failed waiting for *v1.IngressController Informer to sync\"}\n2026-03-13T10:40:51.027Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tAll workers finished\t{\"controller\": \"route_metrics_controller\"}\n2026-03-13T10:40:51.027Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for caches\nW0313 10:40:51.028181 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Role ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-13T10:40:51.028Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for webhooks\n2026-03-13T10:40:51.028Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for HTTP servers\n2026-03-13T10:40:51.028Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\n2026-03-13T10:40:51.028Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\n2026-03-13T10:40:51.033Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"failed to wait for canary_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}\n","startedAt":"2026-03-13T10:38:50Z","finishedAt":"2026-03-13T10:40:51Z","containerID":"cri-o://8931f468146aea32eb1151d08ef9573b7c8bddcc57495ce9f6bd5b790621abc0"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","containerID":"cri-o://246797499d890bbe0f0da9bedf22922185a5c85e0c93f20f83953bdd9898d644","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-qd2mn","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-13T10:38:50Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://6a16ce55b44dfc39848323a97883033429768f52190f07a86f2d6e8605fcf149","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-qd2mn","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-7577d6f48-cbhxt.json0000640000000000000000000001667615154764675030264 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-7577d6f48-cbhxt","generateName":"csi-snapshot-controller-7577d6f48-","namespace":"openshift-cluster-storage-operator","uid":"6622be09-206e-4d02-90ca-6d9f2fc852aa","resourceVersion":"8463","creationTimestamp":"2026-03-13T10:36:09Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"7577d6f48"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.31/23\"],\"mac_address\":\"0a:58:0a:80:00:1f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.31/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.31\"\n ],\n \"mac\": \"0a:58:0a:80:00:1f\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-7577d6f48","uid":"f77f09a0-0a95-4a7d-9c4c-05aeb529f31f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-lqg6g","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-lqg6g","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000150000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c9"},"runAsNonRoot":true,"fsGroup":1000150000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:12Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:09Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:55Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:38:55Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T10:36:09Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.31","podIPs":[{"ip":"10.128.0.31"}],"startTime":"2026-03-13T10:36:09Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2026-03-13T10:38:55Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ler-leader\nI0313 10:36:12.527811 1 leader_election.go:184] \"became leader, starting\"\nI0313 10:36:12.527985 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0313 10:36:12.528028 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0313 10:36:12.528008 1 snapshot_controller_base.go:255] Starting snapshot controller\nI0313 10:36:12.529500 1 reflector.go:368] Caches populated for *v1.VolumeSnapshotClass from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI0313 10:36:12.529632 1 reflector.go:368] Caches populated for *v1.VolumeSnapshot from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI0313 10:36:12.529750 1 reflector.go:368] Caches populated for *v1.VolumeSnapshotContent from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI0313 10:36:12.529894 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160\nI0313 10:36:12.530077 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160\nE0313 10:37:38.559632 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0313 10:38:38.562942 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-storage-operator/snapshot-controller-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io snapshot-controller-leader)\nI0313 10:38:51.555557 1 leaderelection.go:297] failed to renew lease openshift-cluster-storage-operator/snapshot-controller-leader: timed out waiting for the condition\nE0313 10:38:51.555697 1 leader_election.go:188] \"Stopped leading\"\n","startedAt":"2026-03-13T10:36:12Z","finishedAt":"2026-03-13T10:38:51Z","containerID":"cri-o://426e576deb6604dde643ee98f5460b9f1475fda12e39205758c5b7f3ec56452f"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","containerID":"cri-o://000574ac95c46dea00d94f10637b547931d5cf4cebc923f39d6577d129f9a2fa","started":true,"volumeMounts":[{"name":"kube-api-access-lqg6g","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315154764675023466 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"116901f5-bb63-4ae5-9df8-e0edfbbe1e82","resourceVersion":"5196","generation":1,"creationTimestamp":"2026-03-13T10:36:09Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-13T10:36:09Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-13T10:36:09Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-13T10:36:09Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015154764675022071 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"4db24c5c-8710-420e-b0d7-c49f0c46d2b1","resourceVersion":"5180","generation":1,"creationTimestamp":"2026-03-13T10:36:09Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-13T10:36:09Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-13T10:36:09Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-13T10:36:09Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/validatingwebhookconfigurations/prometheusrules.openshift.io.json0000640000000000000000000000511515154764675025754 0ustar0000000000000000{"metadata":{"name":"prometheusrules.openshift.io","uid":"7819aaef-00cc-4919-9674-b07320689e46","resourceVersion":"10069","generation":2,"creationTimestamp":"2026-03-13T10:40:07Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"prometheusrules.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-prometheusrules/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1"],"resources":["prometheusrules"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115154764675025320 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"f4fdd736-14ba-4c36-9471-089e8285932b","resourceVersion":"5535","generation":2,"creationTimestamp":"2026-03-13T10:29:47Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715154764675024045 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"55a7b0b0-8867-4f12-95ed-f478f7ec2d61","resourceVersion":"5536","generation":2,"creationTimestamp":"2026-03-13T10:34:32Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"a2cbdcb0-f46c-4c49-9a1c-4fffc1a113c1","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537315154764675030660 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"cbf7426f-b597-45ea-9ab9-ddf6cd8ef181","resourceVersion":"10424","generation":2,"creationTimestamp":"2026-03-13T10:40:21Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500115154764675032130 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"52501e16-54ce-4db3-b604-227abb190213","resourceVersion":"9612","generation":2,"creationTimestamp":"2026-03-13T10:39:58Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102615154764675025015 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"db232268-c0dd-4382-8c7f-1a206e4f7020","resourceVersion":"9609","generation":2,"creationTimestamp":"2026-03-13T10:39:58Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io.json0000640000000000000000000000514315154764675026522 0ustar0000000000000000{"metadata":{"name":"alertmanagerconfigs.openshift.io","uid":"59400df0-cc63-4cfb-8eab-a480da0599a1","resourceVersion":"10073","generation":2,"creationTimestamp":"2026-03-13T10:40:07Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"alertmanagerconfigs.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-alertmanagerconfigs/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1alpha1"],"resources":["alertmanagerconfigs"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/authentication.json0000640000000000000000000000116415154764675014445 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"1e924f5d-3374-4915-b6c4-27b8d116ce1d","resourceVersion":"997","generation":1,"creationTimestamp":"2026-03-13T10:29:23Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a"}]},"spec":{"type":"","oauthMetadata":{"name":""},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/node/master-0.json0000640000000000000000000000703115154764675014002 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"cb006092-fd40-4d71-84fb-f3ba8c313f97","resourceVersion":"10617","creationTimestamp":"2026-03-13T10:33:23Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node-role.kubernetes.io/worker":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","machineconfiguration.openshift.io/controlPlaneTopology":"SingleReplica","machineconfiguration.openshift.io/currentConfig":"rendered-master-262c9aa90bf73215b74fa7b8b7e6ac94","machineconfiguration.openshift.io/desiredConfig":"rendered-master-262c9aa90bf73215b74fa7b8b7e6ac94","machineconfiguration.openshift.io/desiredDrain":"uncordon-rendered-master-262c9aa90bf73215b74fa7b8b7e6ac94","machineconfiguration.openshift.io/lastAppliedDrain":"uncordon-rendered-master-262c9aa90bf73215b74fa7b8b7e6ac94","machineconfiguration.openshift.io/lastObservedServerCAAnnotation":"false","machineconfiguration.openshift.io/lastSyncedControllerConfigResourceVersion":"10412","machineconfiguration.openshift.io/reason":"","machineconfiguration.openshift.io/state":"Done","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{},"status":{"capacity":{"cpu":"12","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"32865364Ki","pods":"250"},"allocatable":{"cpu":"11500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"31714388Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-03-13T10:40:59Z","lastTransitionTime":"2026-03-13T10:33:23Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-03-13T10:40:59Z","lastTransitionTime":"2026-03-13T10:33:23Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-03-13T10:40:59Z","lastTransitionTime":"2026-03-13T10:33:23Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-03-13T10:40:59Z","lastTransitionTime":"2026-03-13T10:35:36Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.111.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202602172219-0","containerRuntimeVersion":"cri-o://1.31.13-8.rhaos4.18.gitd78977c.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"runc","features":{"recursiveReadOnlyMounts":true}},{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}}]}}config/machineconfigpools/worker.json0000640000000000000000000000775215154764675016617 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-13T10:39:30Z","generation":2,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"10215","uid":"7bbe252b-b2e7-47d3-8b83-e48b93fbdf9a"},"spec":{"configuration":{"name":"rendered-worker-5397bc4c9c199499d943d81493af23d5","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-10T10:17:45Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-14T10:24:19Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-13T10:24:19Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-13T10:24:19Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-10T10:24:16Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-13T10:35:40Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1773398139"}],"conditions":[{"lastTransitionTime":"2026-03-13T10:40:07Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-03-13T10:40:14Z","message":"All nodes are updated with MachineConfig rendered-worker-5397bc4c9c199499d943d81493af23d5","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2026-03-13T10:40:14Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-03-13T10:40:14Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-03-13T10:40:14Z","message":"","reason":"","status":"False","type":"Degraded"}],"configuration":{"name":"rendered-worker-5397bc4c9c199499d943d81493af23d5","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"degradedMachineCount":0,"machineCount":0,"observedGeneration":2,"readyMachineCount":0,"unavailableMachineCount":0,"updatedMachineCount":0}}config/machineconfigpools/master.json0000640000000000000000000001222515154764675016570 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-13T10:39:30Z","generation":2,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"10225","uid":"468643cf-7f39-4ab3-8586-2d93c6791303"},"spec":{"configuration":{"name":"rendered-master-262c9aa90bf73215b74fa7b8b7e6ac94","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-10T10:17:45Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-14T10:24:19Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-13T10:24:19Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-13T10:24:19Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-10T10:24:16Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-13T10:35:40Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1773398139"}],"conditions":[{"lastTransitionTime":"2026-03-13T10:40:08Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-03-13T10:40:18Z","message":"All nodes are updated with MachineConfig rendered-master-262c9aa90bf73215b74fa7b8b7e6ac94","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2026-03-13T10:40:18Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-03-13T10:40:18Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-03-13T10:40:18Z","message":"","reason":"","status":"False","type":"Degraded"}],"configuration":{"name":"rendered-master-262c9aa90bf73215b74fa7b8b7e6ac94","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"degradedMachineCount":0,"machineCount":1,"observedGeneration":2,"readyMachineCount":1,"unavailableMachineCount":0,"updatedMachineCount":1}}config/oauth.json0000640000000000000000000000114415154764675012544 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"bf585659-83ea-4330-8fa9-028b107a1c7d","resourceVersion":"1673","generation":1,"creationTimestamp":"2026-03-13T10:29:38Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/network.json0000640000000000000000000000117015154764675013114 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"a7e272c9-faf9-4a2c-826c-60a084cd2540","resourceVersion":"3324","generation":2,"creationTimestamp":"2026-03-13T10:28:27Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615154764675027522 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"13ae9180-a3b1-497d-bc66-9d57663d4c80","resourceVersion":"6047","generation":2,"creationTimestamp":"2026-03-13T10:36:24Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215154764675020220 0ustar0000000000000000[]config/schedulers/cluster.json0000640000000000000000000000052415154764675015247 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"8a866632-cd09-4a3b-8876-bc1d6a926599","resourceVersion":"571","generation":1,"creationTimestamp":"2026-03-13T10:28:29Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/machinehealthchecks/openshift-machine-api/machine-api-termination-handler.json0000640000000000000000000000163315154764675027667 0ustar0000000000000000{"apiVersion":"machine.openshift.io/v1beta1","kind":"MachineHealthCheck","metadata":{"annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"creationTimestamp":"2026-03-13T10:40:08Z","generation":1,"labels":{"api":"clusterapi","k8s-app":"termination-handler"},"name":"machine-api-termination-handler","namespace":"openshift-machine-api","ownerReferences":[{"apiVersion":"config.openshift.io/v1","controller":true,"kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a"}],"resourceVersion":"10149","uid":"8c051b7b-b1b0-4a55-8978-d9e42b8bab55"},"spec":{"maxUnhealthy":"100%","nodeStartupTimeout":"0","selector":{"matchLabels":{"machine.openshift.io/interruptible-instance":""}},"unhealthyConditions":[{"status":"True","timeout":"0s","type":"Terminating"}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002231415154764675025520 0ustar0000000000000000{"metadata":{"name":"edit","uid":"49cdc29c-81a0-48c9-abc4-0fdd1fcbfb51","resourceVersion":"10293","creationTimestamp":"2026-03-13T10:27:17Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002520115154764675025661 0ustar0000000000000000{"metadata":{"name":"admin","uid":"e22b7b69-11fa-439a-941a-34a3ade27b28","resourceVersion":"10301","creationTimestamp":"2026-03-13T10:27:17Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/apiserver.json0000640000000000000000000000121615154764675013424 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"411f79e9-01fe-4a1b-a573-8b57dfebf42d","resourceVersion":"847","generation":1,"creationTimestamp":"2026-03-13T10:29:20Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/infrastructure.json0000640000000000000000000000106515154764675014506 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"ca22e98b-3bfd-4f2a-a46d-aaaa127cfde3","resourceVersion":"545","generation":1,"creationTimestamp":"2026-03-13T10:28:26Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173515154764675025144 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"2ef85afe-20eb-46d9-ba01-701f2e88a032","resourceVersion":"9490","generation":1,"creationTimestamp":"2026-03-13T10:29:38Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-03-13T10:39:31Z","reason":"SufficientPods","message":""}]}}config/featuregate.json0000640000000000000000000000613615154764675013726 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"21ff1a91-f98c-40a6-b8b0-acd76b87ee81","resourceVersion":"655","generation":1,"creationTimestamp":"2026-03-13T10:28:48Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.34","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/proxy.json0000640000000000000000000000031315154764675012602 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"224caeaa-326c-493a-b06e-07dcc71f17c5","resourceVersion":"566","generation":1,"creationTimestamp":"2026-03-13T10:28:27Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115154764675027772 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"d2ae84b1-e1ac-460a-93b4-dc2387bbf8fc","resourceVersion":"6540","generation":1,"creationTimestamp":"2026-03-13T10:36:32Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T10:36:32Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-03-13T10:36:32Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-03-13T10:36:32Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T10:36:32Z","reason":"AsExpected"}]}}config/ingress.json0000640000000000000000000000043615154764675013101 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"773a8b95-2c29-4a7d-be80-30abecc2b744","resourceVersion":"561","generation":1,"creationTimestamp":"2026-03-13T10:28:26Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/image.json0000640000000000000000000000111715154764675012506 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"46ff2684-3314-475d-86d0-3ffba977371a","resourceVersion":"1438","generation":1,"creationTimestamp":"2026-03-13T10:29:34Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8b58f7c7-f817-402d-8601-c1b1c4219b1a"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}