insights-operator/gathers.json0000640000000000000000000003551715156762356015304 0ustar0000000000000000{"status_reports":[{"name":"workloads/helmchart_info","duration_in_ms":18,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":64,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":185,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":69,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":49,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":265,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":5336,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":17,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":48,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":42,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":64,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":50,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":48,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":25,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":65,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":19,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":26,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":78,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":48,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":43,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":63,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":55,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":52,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":42,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":69,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":63,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":171,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":50,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":68,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":13,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":56,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":62,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":50,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":142,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":10906,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":46,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":135,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":102,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":171,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":24,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":55,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":85,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":49,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":75,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":28,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":175,"records_count":10,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":12359,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":5337,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":156,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":55,"records_count":0,"errors":["machineautoscalers.autoscaling.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machineautoscalers\" in API group \"autoscaling.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":82,"records_count":6,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":16958,"records_count":58,"errors":["the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-9w7hc.json\" was already recorded and had the fingerprint \"f25840e6eddfbc5841ae2a4d6657a47b2307f15081fd793ccfb8de98f31f9204\", overwriting with the record having fingerprint \"f25840e6eddfbc5841ae2a4d6657a47b2307f15081fd793ccfb8de98f31f9204\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-9w7hc/etcd-operator_previous.log\" was already recorded and had the fingerprint \"44a45a633135adedab67ec69df2e5d245781886e7c91f1a3e02eb2845fddbbc7\", overwriting with the record having fingerprint \"44a45a633135adedab67ec69df2e5d245781886e7c91f1a3e02eb2845fddbbc7\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-9w7hc/etcd-operator_current.log\" was already recorded and had the fingerprint \"3778e376c3ac3857a8cc5a923c38292887945d0b0cd5d074b5585d846f95690a\", overwriting with the record having fingerprint \"3778e376c3ac3857a8cc5a923c38292887945d0b0cd5d074b5585d846f95690a\""],"warnings":["warning: the record with the same fingerprint \"f25840e6eddfbc5841ae2a4d6657a47b2307f15081fd793ccfb8de98f31f9204\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-9w7hc.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-9w7hc.json\"","warning: the record with the same fingerprint \"44a45a633135adedab67ec69df2e5d245781886e7c91f1a3e02eb2845fddbbc7\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-9w7hc/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-9w7hc/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"3778e376c3ac3857a8cc5a923c38292887945d0b0cd5d074b5585d846f95690a\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-9w7hc/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-9w7hc/etcd-operator_current.log\""],"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":93,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":25,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":63,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":63,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":69,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":17039,"records_count":146,"errors":["function \"pod_network_connectivity_checks\" failed with an error","function \"machine_autoscalers\" failed with an error","function \"support_secret\" failed with an error","function \"silenced_alerts\" failed with an error","function \"active_alerts\" failed with an error","function \"tsdb_status\" failed with an error","function \"metrics\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-9w7hc.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-9w7hc/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-9w7hc/etcd-operator_current.log\""],"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":59,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":41,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":24,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":63,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":41,"records_count":0,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":23.495,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515156762355020001 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515156762355021103 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005116715156762355014266 0ustar0000000000000000{"pods":77,"imageCount":63,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:c9f7bbe4799eaacbfbb60eb906000d7a813a580d6a9740def7da774cbc4cf859","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:aefc421cf2f5dba925f7c149d56ce14e910fbd969a4e22b5917fc912ca33a5b2","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:632e80bba5077068ecca05fddb95aedebad4493af6f36152c01c6ae490975b62","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:898c67bf7fc973e99114f3148976a6c21ae0dbe413051415588fa9b995f5b331","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:3ea089ab116e164d89b46dc077f87d9af22f525bc2d69403214f77ee3fd30161","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":1,"terminalCount":1,"shapes":[]},"4k7XyKW2A17e":{"count":1,"terminalCount":1,"shapes":[]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:30a2f97d7785ce8b0ea5115e67c4554b64adefbc7856bcf6f4fe6cc7e938a310","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:7c527b4e8239a1f4f4e0a851113e7dd633b7dcb9d75b0e7b21c23d26304abcb3","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:82f2c59d19eb73ad5c0f93b0a63003c1885f5297959c9c45b401d1a74aea6e76","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1973d56a1097a48ea0ebf2c4dbae1ed86fa67bb0116f4962f7720d48aa337d27","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ea5c8a93f30e0a4932da5697d22c0da7eda9a7035c0555eb006b6755e62bb2fc","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ab745a9e15dadc862548ceb5740b8f5d02075232760c6715d82b4c3b70eddca9","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:ab745a9e15dadc862548ceb5740b8f5d02075232760c6715d82b4c3b70eddca9","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":4,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]},{"duplicates":1,"restartAlways":false,"containers":[{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"gcNszUTvGLqr"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:cdd28dfe7132e19af9f013f72cf120d970bc31b6b74693af262f8d2e82a096e1","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:112a03f2411f871cdaca5f20daef71024dac710113d5f30897117a5a02f6b6f5","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:112a03f2411f871cdaca5f20daef71024dac710113d5f30897117a5a02f6b6f5","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ce8e3088493b4a72dd766b3b5b4ccb83b7d72d514bbf64063a913dfe961273db","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:908eaaf624959bc7645f6d585d160431d1efb070e9a1f37fefed73a3be42b0d3","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:de91abd5ad76fb491881a75a0feb4b8ca5600ceb5e15a4b0b687ada01ea0a44c","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","firstCommand":"zT6_GoC4_8OY","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"aC8iSHmKHojh","firstArg":"eE7ekwlit3Mq"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a746a87b784ea1caa278fd0e012554f9df520b6fff665ea0bc4c83f487fed113","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9174864cd47431966d033d283bc7836e7ca579139ef85c36275db542fda80803","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:97c7a635130c574a2c501091bb44f17cd92e05e29b5102e59578b5885d9bfec0","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7af9f5c5af9d529840233ef4b519120cc0e3f14c4fe28cc43b0823f2c11d8f89","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000011326215156762350033640 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-bbf67c86c-n58nq2026-03-19T11:57:55.978905824Z I0319 11:57:55.978827 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-19T11:57:55.979790125Z I0319 11:57:55.979766 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-19T11:57:55.983434394Z I0319 11:57:55.983389 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:57:55.983483835Z I0319 11:57:55.983467 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:57:55.984327515Z I0319 11:57:55.984073 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:57:55.984327515Z I0319 11:57:55.984096 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:57:56.866639530Z time="2026-03-19T11:57:56Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-19T11:57:56.866888326Z time="2026-03-19T11:57:56Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.197.10:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-03-19T11:57:56.887486135Z W0319 11:57:56.887402 1 logging.go:55] [core] [Channel #4 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.197.10:50051: connect: connection refused" 2026-03-19T11:57:56.887543817Z W0319 11:57:56.887535 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.13.201:50051: connect: connection refused" 2026-03-19T11:57:56.887699171Z W0319 11:57:56.887646 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.77.242:50051: connect: connection refused" 2026-03-19T11:57:56.910684959Z E0319 11:57:56.907839 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.910684959Z E0319 11:57:56.908120 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.910684959Z E0319 11:57:56.909863 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.910684959Z E0319 11:57:56.909967 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.910684959Z E0319 11:57:56.910037 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.937372847Z E0319 11:57:56.936178 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.937372847Z E0319 11:57:56.936601 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.937372847Z E0319 11:57:56.936903 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.937372847Z E0319 11:57:56.936973 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.937372847Z E0319 11:57:56.936975 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.937372847Z E0319 11:57:56.937092 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.940200106Z E0319 11:57:56.940151 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.940200106Z E0319 11:57:56.940174 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.940243967Z E0319 11:57:56.940216 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.940243967Z E0319 11:57:56.940219 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.940439651Z E0319 11:57:56.940411 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.943368132Z E0319 11:57:56.943334 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.953845297Z E0319 11:57:56.953358 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.953845297Z E0319 11:57:56.953662 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.953885098Z E0319 11:57:56.953827 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.954205556Z E0319 11:57:56.954178 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.954684157Z E0319 11:57:56.954664 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.997481856Z E0319 11:57:56.997408 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.997524137Z E0319 11:57:56.997483 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.997826545Z E0319 11:57:56.997796 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.997949057Z E0319 11:57:56.997923 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:56.998016149Z E0319 11:57:56.997411 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:57.085366531Z E0319 11:57:57.085280 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:57.085658228Z E0319 11:57:57.085625 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:57.085842842Z E0319 11:57:57.085812 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:57.085997196Z E0319 11:57:57.085969 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:57.086146759Z E0319 11:57:57.086118 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:57.251926445Z E0319 11:57:57.251608 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:57.251926445Z E0319 11:57:57.251637 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:57.251926445Z E0319 11:57:57.251860 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:57.251926445Z E0319 11:57:57.251886 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:57.251966766Z E0319 11:57:57.251929 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:57.577009088Z E0319 11:57:57.576926 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:57.577009088Z E0319 11:57:57.576941 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:57.577075240Z E0319 11:57:57.577000 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:57.577160622Z E0319 11:57:57.577040 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:57.577368977Z E0319 11:57:57.577288 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:58.224112090Z E0319 11:57:58.224033 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:58.224492139Z E0319 11:57:58.224460 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:58.224610522Z E0319 11:57:58.224567 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:58.224686003Z E0319 11:57:58.224655 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:58.224686003Z E0319 11:57:58.224657 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:58.485221661Z W0319 11:57:58.485156 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.13.201:50051: connect: connection refused" 2026-03-19T11:57:58.718390182Z W0319 11:57:58.718313 1 logging.go:55] [core] [Channel #4 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.197.10:50051: connect: connection refused" 2026-03-19T11:57:58.735500697Z W0319 11:57:58.735458 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.77.242:50051: connect: connection refused" 2026-03-19T11:57:59.512026123Z E0319 11:57:59.511962 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:59.513134470Z E0319 11:57:59.512365 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:59.513134470Z E0319 11:57:59.512574 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:59.513134470Z E0319 11:57:59.512789 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:59.513134470Z E0319 11:57:59.513013 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:00.919387685Z W0319 11:58:00.919311 1 logging.go:55] [core] [Channel #4 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.197.10:50051: connect: connection refused" 2026-03-19T11:58:01.387348407Z W0319 11:58:01.387266 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.77.242:50051: connect: connection refused" 2026-03-19T11:58:02.075902867Z E0319 11:58:02.075532 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:02.075976779Z E0319 11:58:02.075939 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:02.085586542Z E0319 11:58:02.085506 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:02.085664834Z E0319 11:58:02.085631 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:02.085792427Z E0319 11:58:02.085761 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:04.745382297Z W0319 11:58:04.745296 1 logging.go:55] [core] [Channel #4 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.197.10:50051: connect: connection refused" 2026-03-19T11:58:05.683869025Z time="2026-03-19T11:58:05Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-19T11:58:06.166800841Z W0319 11:58:06.166744 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.77.242:50051: connect: connection refused" 2026-03-19T11:58:07.213682752Z E0319 11:58:07.213337 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:07.213773604Z E0319 11:58:07.213680 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:07.213903787Z E0319 11:58:07.213868 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:07.214068591Z E0319 11:58:07.214044 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:07.214202724Z E0319 11:58:07.214175 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.507053118Z E0319 11:58:09.506984 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.507361885Z E0319 11:58:09.507326 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.507480488Z E0319 11:58:09.507446 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.507523379Z E0319 11:58:09.507500 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.507661732Z E0319 11:58:09.507343 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.655242035Z E0319 11:58:09.655167 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.658687329Z E0319 11:58:09.658659 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:10.277304151Z time="2026-03-19T11:58:10Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-19T11:58:10.277304151Z time="2026-03-19T11:58:10Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.197.10:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-03-19T11:58:11.496629198Z W0319 11:58:11.496574 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.77.242:50051: connect: connection refused" 2026-03-19T11:58:12.362491462Z time="2026-03-19T11:58:12Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-19T11:58:14.242353879Z time="2026-03-19T11:58:14Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-19T11:58:14.242427991Z time="2026-03-19T11:58:14Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.77.242:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-19T11:58:17.460617013Z E0319 11:58:17.460546 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:17.460866399Z E0319 11:58:17.460832 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:17.461111925Z E0319 11:58:17.461078 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:17.461223358Z E0319 11:58:17.461093 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:17.461329081Z E0319 11:58:17.461299 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:20.255233291Z W0319 11:58:20.254983 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.77.242:50051: connect: connection refused" package-server-manager_current.log0000640000000000000000000003755015156762350037004 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-7b95f86987-jq5vq2026-03-19T11:54:13.229855572Z 2026-03-19T11:54:13Z INFO setup starting manager 2026-03-19T11:54:13.230838575Z 2026-03-19T11:54:13Z INFO controller-runtime.metrics Starting metrics server 2026-03-19T11:54:13.230899366Z 2026-03-19T11:54:13Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-03-19T11:54:13.230994778Z 2026-03-19T11:54:13Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-03-19T11:54:13.231005368Z 2026-03-19T11:54:13Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-03-19T11:54:13.232810059Z I0319 11:54:13.232713 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-03-19T11:54:13.248168864Z I0319 11:54:13.245754 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-03-19T11:54:13.250096658Z 2026-03-19T11:54:13Z DEBUG events package-server-manager-7b95f86987-jq5vq_c97f0069-6ed9-43ea-9c76-ee0bad6990d8 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"fd8b388d-3617-4718-bd78-731e788666d3","apiVersion":"coordination.k8s.io/v1","resourceVersion":"8880"}, "reason": "LeaderElection"} 2026-03-19T11:54:13.254642710Z 2026-03-19T11:54:13Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-03-19T11:54:13.254642710Z 2026-03-19T11:54:13Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-03-19T11:54:13.254642710Z 2026-03-19T11:54:13Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-03-19T11:54:13.378074845Z 2026-03-19T11:54:13Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-03-19T11:54:13.378363751Z 2026-03-19T11:54:13Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-03-19T11:54:13.385342878Z 2026-03-19T11:54:13Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-19T11:54:13.385342878Z 2026-03-19T11:54:13Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:13.693483946Z 2026-03-19T11:54:13Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:13.693483946Z 2026-03-19T11:54:13Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-19T11:54:13.733010715Z 2026-03-19T11:54:13Z INFO controllers.packageserver attempting to create the packageserver csv 2026-03-19T11:54:13.754093720Z 2026-03-19T11:54:13Z INFO controllers.packageserver updating csv spec 2026-03-19T11:54:13.808226146Z 2026-03-19T11:54:13Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2026-03-19T11:54:13.808595474Z 2026-03-19T11:54:13Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:13.823642343Z 2026-03-19T11:54:13Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-19T11:54:13.823642343Z 2026-03-19T11:54:13Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:13.823892098Z 2026-03-19T11:54:13Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:13.824039782Z 2026-03-19T11:54:13Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-19T11:54:13.881073584Z 2026-03-19T11:54:13Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-19T11:54:13.881073584Z 2026-03-19T11:54:13Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:13.881073584Z 2026-03-19T11:54:13Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-19T11:54:13.881073584Z 2026-03-19T11:54:13Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:13.887809746Z 2026-03-19T11:54:13Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:13.887809746Z 2026-03-19T11:54:13Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-19T11:54:13.943375555Z 2026-03-19T11:54:13Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-19T11:54:13.943375555Z 2026-03-19T11:54:13Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:13.943431267Z 2026-03-19T11:54:13Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-19T11:54:13.943431267Z 2026-03-19T11:54:13Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:13.943515569Z 2026-03-19T11:54:13Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:13.943524359Z 2026-03-19T11:54:13Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-19T11:54:13.971181381Z 2026-03-19T11:54:13Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-19T11:54:13.971181381Z 2026-03-19T11:54:13Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:14.147430983Z 2026-03-19T11:54:14Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-19T11:54:14.147430983Z 2026-03-19T11:54:14Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:14.147468814Z 2026-03-19T11:54:14Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:14.147505434Z 2026-03-19T11:54:14Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-19T11:54:14.163658838Z 2026-03-19T11:54:14Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-19T11:54:14.163658838Z 2026-03-19T11:54:14Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:55:47.289718712Z E0319 11:55:47.289620 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-19T11:56:47.293884066Z E0319 11:56:47.293645 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock) 2026-03-19T11:57:33.920998830Z 2026-03-19T11:57:33Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-19T11:57:33.920998830Z 2026-03-19T11:57:33Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:57:33.921063433Z 2026-03-19T11:57:33Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:57:33.921090903Z 2026-03-19T11:57:33Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-19T11:57:33.939537991Z 2026-03-19T11:57:33Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-19T11:57:33.939537991Z 2026-03-19T11:57:33Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:57:33.945341782Z 2026-03-19T11:57:33Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-19T11:57:33.945341782Z 2026-03-19T11:57:33Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:57:33.945421494Z 2026-03-19T11:57:33Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:57:33.945466155Z 2026-03-19T11:57:33Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-19T11:57:33.954386921Z 2026-03-19T11:57:33Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-19T11:57:33.954386921Z 2026-03-19T11:57:33Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:57:34.054243027Z 2026-03-19T11:57:34Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-19T11:57:34.054243027Z 2026-03-19T11:57:34Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:57:34.054290128Z 2026-03-19T11:57:34Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:57:34.054321518Z 2026-03-19T11:57:34Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-19T11:57:34.071944206Z 2026-03-19T11:57:34Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-19T11:57:34.071944206Z 2026-03-19T11:57:34Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:57:40.585142467Z 2026-03-19T11:57:40Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-19T11:57:40.585142467Z 2026-03-19T11:57:40Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:57:40.589903112Z 2026-03-19T11:57:40Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:57:40.592975267Z 2026-03-19T11:57:40Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-19T11:57:40.627447254Z 2026-03-19T11:57:40Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-19T11:57:40.627447254Z 2026-03-19T11:57:40Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:57:40.627447254Z 2026-03-19T11:57:40Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-19T11:57:40.627447254Z 2026-03-19T11:57:40Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:57:40.627612508Z 2026-03-19T11:57:40Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:57:40.627622658Z 2026-03-19T11:57:40Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-19T11:57:40.641385812Z 2026-03-19T11:57:40Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-19T11:57:40.641385812Z 2026-03-19T11:57:40Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} kube-rbac-proxy_current.log0000640000000000000000000000160415156762350035476 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-7b95f86987-jq5vq2026-03-19T11:54:02.880499508Z W0319 11:54:02.880283 1 deprecated.go:66] 2026-03-19T11:54:02.880499508Z ==== Removed Flag Warning ====================== 2026-03-19T11:54:02.880499508Z 2026-03-19T11:54:02.880499508Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-19T11:54:02.880499508Z 2026-03-19T11:54:02.880499508Z =============================================== 2026-03-19T11:54:02.880499508Z 2026-03-19T11:54:02.881104672Z I0319 11:54:02.881089 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-19T11:54:02.882199647Z I0319 11:54:02.882170 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-19T11:54:02.882579045Z I0319 11:54:02.882546 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-19T11:54:02.883191668Z I0319 11:54:02.883140 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 olm-operator_current.log0000640000000000000000000005177415156762350033007 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-5c9796789-l9sw92026-03-19T11:58:16.997119469Z time="2026-03-19T11:58:16Z" level=info msg="install strategy successful" csv=packageserver id=jei0R namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:17.097386514Z time="2026-03-19T11:58:17Z" level=info msg="install strategy successful" csv=packageserver id=HiUdB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:17.199080172Z time="2026-03-19T11:58:17Z" level=info msg="install strategy successful" csv=packageserver id=HHO2y namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:17.298580328Z time="2026-03-19T11:58:17Z" level=info msg="install strategy successful" csv=packageserver id=DVFwv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:17.399752396Z time="2026-03-19T11:58:17Z" level=info msg="install strategy successful" csv=packageserver id=RPdSb namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:17.499071047Z time="2026-03-19T11:58:17Z" level=info msg="install strategy successful" csv=packageserver id=S3hep namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:17.600565961Z time="2026-03-19T11:58:17Z" level=info msg="install strategy successful" csv=packageserver id=uGp/a namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:17.701452381Z time="2026-03-19T11:58:17Z" level=info msg="install strategy successful" csv=packageserver id=fJ6Hk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:17.801955352Z time="2026-03-19T11:58:17Z" level=info msg="install strategy successful" csv=packageserver id=eE9T5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:17.903548588Z time="2026-03-19T11:58:17Z" level=info msg="install strategy successful" csv=packageserver id=iaF6K namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:18.002196194Z time="2026-03-19T11:58:18Z" level=info msg="install strategy successful" csv=packageserver id=cKhd8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:18.083512828Z time="2026-03-19T11:58:18Z" level=info msg="install strategy successful" csv=packageserver id=O1+nT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:18.185813082Z time="2026-03-19T11:58:18Z" level=info msg="install strategy successful" csv=packageserver id=YFxpt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:18.287427290Z time="2026-03-19T11:58:18Z" level=info msg="install strategy successful" csv=packageserver id=OqOYf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:18.388012142Z time="2026-03-19T11:58:18Z" level=info msg="install strategy successful" csv=packageserver id=+2XoR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:18.489091567Z time="2026-03-19T11:58:18Z" level=info msg="install strategy successful" csv=packageserver id=rw+Fn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:18.591363780Z time="2026-03-19T11:58:18Z" level=info msg="install strategy successful" csv=packageserver id=pxHT2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:18.689832951Z time="2026-03-19T11:58:18Z" level=info msg="install strategy successful" csv=packageserver id=+7Wo5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:18.793100258Z time="2026-03-19T11:58:18Z" level=info msg="install strategy successful" csv=packageserver id=e4qWa namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:18.890285138Z time="2026-03-19T11:58:18Z" level=info msg="install strategy successful" csv=packageserver id=/fxKT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:18.994961810Z time="2026-03-19T11:58:18Z" level=info msg="install strategy successful" csv=packageserver id=GuOTJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:19.094991088Z time="2026-03-19T11:58:19Z" level=info msg="install strategy successful" csv=packageserver id=BWlWN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:19.375038838Z time="2026-03-19T11:58:19Z" level=info msg="install strategy successful" csv=packageserver id=qUcTD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:19.476815780Z time="2026-03-19T11:58:19Z" level=info msg="install strategy successful" csv=packageserver id=M3dq9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:19.484805664Z time="2026-03-19T11:58:19Z" level=info msg="install strategy successful" csv=packageserver id=OopCk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:19.491195289Z time="2026-03-19T11:58:19Z" level=info msg="install strategy successful" csv=packageserver id=QDJG9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:19.584610217Z time="2026-03-19T11:58:19Z" level=info msg="install strategy successful" csv=packageserver id=S3CMi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:19.683370586Z time="2026-03-19T11:58:19Z" level=info msg="install strategy successful" csv=packageserver id=kr6Yq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:19.785373782Z time="2026-03-19T11:58:19Z" level=info msg="install strategy successful" csv=packageserver id=5/WHy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:19.886015056Z time="2026-03-19T11:58:19Z" level=info msg="install strategy successful" csv=packageserver id=aS2Sc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:19.986803493Z time="2026-03-19T11:58:19Z" level=info msg="install strategy successful" csv=packageserver id=ISx0V namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:20.092801287Z time="2026-03-19T11:58:20Z" level=info msg="install strategy successful" csv=packageserver id=3X3AB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:20.192919879Z time="2026-03-19T11:58:20Z" level=info msg="install strategy successful" csv=packageserver id=E5ynB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:20.290057117Z time="2026-03-19T11:58:20Z" level=info msg="install strategy successful" csv=packageserver id=eQ8V0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:20.390813344Z time="2026-03-19T11:58:20Z" level=info msg="install strategy successful" csv=packageserver id=c8SWD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:20.489787847Z time="2026-03-19T11:58:20Z" level=info msg="install strategy successful" csv=packageserver id=AtllE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:20.590312937Z time="2026-03-19T11:58:20Z" level=info msg="install strategy successful" csv=packageserver id=FZFAV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:20.697818598Z time="2026-03-19T11:58:20Z" level=info msg="install strategy successful" csv=packageserver id=NdF27 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:20.787613798Z time="2026-03-19T11:58:20Z" level=info msg="install strategy successful" csv=packageserver id=UVbe8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:20.884255965Z time="2026-03-19T11:58:20Z" level=info msg="install strategy successful" csv=packageserver id=EekGA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:20.984494309Z time="2026-03-19T11:58:20Z" level=info msg="install strategy successful" csv=packageserver id=1wsoY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:21.086158877Z time="2026-03-19T11:58:21Z" level=info msg="install strategy successful" csv=packageserver id=LdJbf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:21.186138375Z time="2026-03-19T11:58:21Z" level=info msg="install strategy successful" csv=packageserver id=CaOM7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:21.282971767Z time="2026-03-19T11:58:21Z" level=info msg="install strategy successful" csv=packageserver id=aMMJw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:21.383635301Z time="2026-03-19T11:58:21Z" level=info msg="install strategy successful" csv=packageserver id=B0Wms namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:21.485381232Z time="2026-03-19T11:58:21Z" level=info msg="install strategy successful" csv=packageserver id=JCv2a namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:21.601027429Z time="2026-03-19T11:58:21Z" level=info msg="install strategy successful" csv=packageserver id=OXRt8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:21.683949172Z time="2026-03-19T11:58:21Z" level=info msg="install strategy successful" csv=packageserver id=0tu1v namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:21.784105815Z time="2026-03-19T11:58:21Z" level=info msg="install strategy successful" csv=packageserver id=sIfTW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:21.884863421Z time="2026-03-19T11:58:21Z" level=info msg="install strategy successful" csv=packageserver id=9bV0I namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:21.985302631Z time="2026-03-19T11:58:21Z" level=info msg="install strategy successful" csv=packageserver id=jQG2N namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:22.085656427Z time="2026-03-19T11:58:22Z" level=info msg="install strategy successful" csv=packageserver id=qas5s namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:22.183010331Z time="2026-03-19T11:58:22Z" level=info msg="install strategy successful" csv=packageserver id=nV6uN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:22.291850044Z time="2026-03-19T11:58:22Z" level=info msg="install strategy successful" csv=packageserver id=JhaQ8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:22.392107678Z time="2026-03-19T11:58:22Z" level=info msg="install strategy successful" csv=packageserver id=Haop2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:22.492866395Z time="2026-03-19T11:58:22Z" level=info msg="install strategy successful" csv=packageserver id=8EFtG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:22.583331692Z time="2026-03-19T11:58:22Z" level=info msg="install strategy successful" csv=packageserver id=+Q9ji namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:22.683600216Z time="2026-03-19T11:58:22Z" level=info msg="install strategy successful" csv=packageserver id=aWOU8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:22.784647570Z time="2026-03-19T11:58:22Z" level=info msg="install strategy successful" csv=packageserver id=EBMFW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:22.885797606Z time="2026-03-19T11:58:22Z" level=info msg="install strategy successful" csv=packageserver id=goctS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:22.983530259Z time="2026-03-19T11:58:22Z" level=info msg="install strategy successful" csv=packageserver id=71Cmn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:23.083151468Z time="2026-03-19T11:58:23Z" level=info msg="install strategy successful" csv=packageserver id=6cDI9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:23.183819603Z time="2026-03-19T11:58:23Z" level=info msg="install strategy successful" csv=packageserver id=drc/Q namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:23.289844606Z time="2026-03-19T11:58:23Z" level=info msg="install strategy successful" csv=packageserver id=YHmSm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:23.388151524Z time="2026-03-19T11:58:23Z" level=info msg="install strategy successful" csv=packageserver id=rjWaL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:23.489134576Z time="2026-03-19T11:58:23Z" level=info msg="install strategy successful" csv=packageserver id=ieQc0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:23.585038874Z time="2026-03-19T11:58:23Z" level=info msg="install strategy successful" csv=packageserver id=vELez namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:23.685095244Z time="2026-03-19T11:58:23Z" level=info msg="install strategy successful" csv=packageserver id=4M/Dl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:23.784857497Z time="2026-03-19T11:58:23Z" level=info msg="install strategy successful" csv=packageserver id=vhzt6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:23.883680537Z time="2026-03-19T11:58:23Z" level=info msg="install strategy successful" csv=packageserver id=5MzS9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:23.984774121Z time="2026-03-19T11:58:23Z" level=info msg="install strategy successful" csv=packageserver id=VUzW3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:24.092678901Z time="2026-03-19T11:58:24Z" level=info msg="install strategy successful" csv=packageserver id=U+IiH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:24.193394167Z time="2026-03-19T11:58:24Z" level=info msg="install strategy successful" csv=packageserver id=4czmB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:24.294881211Z time="2026-03-19T11:58:24Z" level=info msg="install strategy successful" csv=packageserver id=sGIq8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:24.391787823Z time="2026-03-19T11:58:24Z" level=info msg="install strategy successful" csv=packageserver id=uGQq5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:24.494819716Z time="2026-03-19T11:58:24Z" level=info msg="install strategy successful" csv=packageserver id=GGFdl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:24.593552774Z time="2026-03-19T11:58:24Z" level=info msg="install strategy successful" csv=packageserver id=b996K namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:24.683556309Z time="2026-03-19T11:58:24Z" level=info msg="install strategy successful" csv=packageserver id=jUe6m namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:24.786315953Z time="2026-03-19T11:58:24Z" level=info msg="install strategy successful" csv=packageserver id=pNzwh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:24.886174489Z time="2026-03-19T11:58:24Z" level=info msg="install strategy successful" csv=packageserver id=A8Io+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:24.987054458Z time="2026-03-19T11:58:24Z" level=info msg="install strategy successful" csv=packageserver id=wQwkH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:25.083840308Z time="2026-03-19T11:58:25Z" level=info msg="install strategy successful" csv=packageserver id=vdpAT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:25.186584393Z time="2026-03-19T11:58:25Z" level=info msg="install strategy successful" csv=packageserver id=RE8B0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:25.282059701Z time="2026-03-19T11:58:25Z" level=info msg="install strategy successful" csv=packageserver id=r1/fC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:25.390072823Z time="2026-03-19T11:58:25Z" level=info msg="install strategy successful" csv=packageserver id=aosSu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:25.487988891Z time="2026-03-19T11:58:25Z" level=info msg="install strategy successful" csv=packageserver id=4qWTz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:25.583639474Z time="2026-03-19T11:58:25Z" level=info msg="install strategy successful" csv=packageserver id=wYohk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:25.683330575Z time="2026-03-19T11:58:25Z" level=info msg="install strategy successful" csv=packageserver id=qWnVA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:25.783365193Z time="2026-03-19T11:58:25Z" level=info msg="install strategy successful" csv=packageserver id=Il+nj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:25.885373060Z time="2026-03-19T11:58:25Z" level=info msg="install strategy successful" csv=packageserver id=gTbyU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:25.983510083Z time="2026-03-19T11:58:25Z" level=info msg="install strategy successful" csv=packageserver id=AHiJi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:26.085433618Z time="2026-03-19T11:58:26Z" level=info msg="install strategy successful" csv=packageserver id=zLe29 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:26.184464773Z time="2026-03-19T11:58:26Z" level=info msg="install strategy successful" csv=packageserver id=cCVj6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:26.284780748Z time="2026-03-19T11:58:26Z" level=info msg="install strategy successful" csv=packageserver id=aK6J9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:26.383945346Z time="2026-03-19T11:58:26Z" level=info msg="install strategy successful" csv=packageserver id=/3Vg/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:26.533519648Z time="2026-03-19T11:58:26Z" level=info msg="install strategy successful" csv=packageserver id=Ll0dj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:27.303466564Z time="2026-03-19T11:58:27Z" level=info msg="install strategy successful" csv=packageserver id=TEzHx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:31.131755120Z time="2026-03-19T11:58:31Z" level=info msg="install strategy successful" csv=packageserver id=E08Qa namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:31.245943183Z time="2026-03-19T11:58:31Z" level=info msg="install strategy successful" csv=packageserver id=+ZkwK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:58:31.354752515Z time="2026-03-19T11:58:31Z" level=info msg="install strategy successful" csv=packageserver id=T+/FV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment catalog-operator_current.log0000640000000000000000000005671615156762350034720 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-68f85b4d6c-n5gr92026-03-19T11:58:09.485522124Z time="2026-03-19T11:58:09Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=rQ9DX 2026-03-19T11:58:09.485522124Z time="2026-03-19T11:58:09Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ccbc5 current-pod.namespace=openshift-marketplace id=rQ9DX 2026-03-19T11:58:09.485522124Z time="2026-03-19T11:58:09Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ccbc5 current-pod.namespace=openshift-marketplace id=rQ9DX 2026-03-19T11:58:09.485522124Z time="2026-03-19T11:58:09Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=rQ9DX 2026-03-19T11:58:09.485522124Z time="2026-03-19T11:58:09Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=rQ9DX 2026-03-19T11:58:10.277357042Z time="2026-03-19T11:58:10Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=bn5dG 2026-03-19T11:58:10.277357042Z time="2026-03-19T11:58:10Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=bn5dG 2026-03-19T11:58:10.285895039Z time="2026-03-19T11:58:10Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=bn5dG 2026-03-19T11:58:10.285895039Z time="2026-03-19T11:58:10Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ccbc5 current-pod.namespace=openshift-marketplace id=bn5dG 2026-03-19T11:58:10.285895039Z time="2026-03-19T11:58:10Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ccbc5 current-pod.namespace=openshift-marketplace id=bn5dG 2026-03-19T11:58:10.285895039Z time="2026-03-19T11:58:10Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=bn5dG 2026-03-19T11:58:10.285895039Z time="2026-03-19T11:58:10Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=bn5dG 2026-03-19T11:58:10.285895039Z time="2026-03-19T11:58:10Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=bn5dG 2026-03-19T11:58:11.525133020Z time="2026-03-19T11:58:11Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=bn5dG 2026-03-19T11:58:11.525359865Z time="2026-03-19T11:58:11Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ccbc5 current-pod.namespace=openshift-marketplace id=bn5dG 2026-03-19T11:58:11.525359865Z time="2026-03-19T11:58:11Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ccbc5 current-pod.namespace=openshift-marketplace id=bn5dG 2026-03-19T11:58:11.525485348Z time="2026-03-19T11:58:11Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=bn5dG 2026-03-19T11:58:11.525485348Z time="2026-03-19T11:58:11Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=bn5dG 2026-03-19T11:58:11.537086959Z time="2026-03-19T11:58:11Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=redhat-marketplace state.State=READY" 2026-03-19T11:58:11.537086959Z time="2026-03-19T11:58:11Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=/0Uf3 2026-03-19T11:58:11.537086959Z time="2026-03-19T11:58:11Z" level=info msg="resolving sources" id=5CtEX namespace=openshift-marketplace 2026-03-19T11:58:11.537086959Z time="2026-03-19T11:58:11Z" level=info msg="checking if subscriptions need update" id=5CtEX namespace=openshift-marketplace 2026-03-19T11:58:11.537086959Z time="2026-03-19T11:58:11Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=/0Uf3 2026-03-19T11:58:11.540440361Z time="2026-03-19T11:58:11Z" level=info msg="No subscriptions were found in namespace openshift-marketplace" id=5CtEX namespace=openshift-marketplace 2026-03-19T11:58:11.543961326Z time="2026-03-19T11:58:11Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=/0Uf3 2026-03-19T11:58:11.543961326Z time="2026-03-19T11:58:11Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ccbc5 current-pod.namespace=openshift-marketplace id=/0Uf3 2026-03-19T11:58:11.543961326Z time="2026-03-19T11:58:11Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ccbc5 current-pod.namespace=openshift-marketplace id=/0Uf3 2026-03-19T11:58:11.543961326Z time="2026-03-19T11:58:11Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=/0Uf3 2026-03-19T11:58:11.543961326Z time="2026-03-19T11:58:11Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=/0Uf3 2026-03-19T11:58:11.543961326Z time="2026-03-19T11:58:11Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=/0Uf3 2026-03-19T11:58:12.171570267Z time="2026-03-19T11:58:12Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=/0Uf3 2026-03-19T11:58:12.171570267Z time="2026-03-19T11:58:12Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ccbc5 current-pod.namespace=openshift-marketplace id=/0Uf3 2026-03-19T11:58:12.171570267Z time="2026-03-19T11:58:12Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ccbc5 current-pod.namespace=openshift-marketplace id=/0Uf3 2026-03-19T11:58:12.171570267Z time="2026-03-19T11:58:12Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=/0Uf3 2026-03-19T11:58:12.171570267Z time="2026-03-19T11:58:12Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=/0Uf3 2026-03-19T11:58:12.370159888Z time="2026-03-19T11:58:12Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=gARE/ 2026-03-19T11:58:12.370159888Z time="2026-03-19T11:58:12Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=gARE/ 2026-03-19T11:58:12.370159888Z time="2026-03-19T11:58:12Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=gARE/ 2026-03-19T11:58:12.370159888Z time="2026-03-19T11:58:12Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ccbc5 current-pod.namespace=openshift-marketplace id=gARE/ 2026-03-19T11:58:12.370159888Z time="2026-03-19T11:58:12Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ccbc5 current-pod.namespace=openshift-marketplace id=gARE/ 2026-03-19T11:58:12.370159888Z time="2026-03-19T11:58:12Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=gARE/ 2026-03-19T11:58:12.370159888Z time="2026-03-19T11:58:12Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=gARE/ 2026-03-19T11:58:12.370159888Z time="2026-03-19T11:58:12Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=gARE/ 2026-03-19T11:58:12.789147532Z time="2026-03-19T11:58:12Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=gARE/ 2026-03-19T11:58:12.789212074Z time="2026-03-19T11:58:12Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ccbc5 current-pod.namespace=openshift-marketplace id=gARE/ 2026-03-19T11:58:12.789212074Z time="2026-03-19T11:58:12Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ccbc5 current-pod.namespace=openshift-marketplace id=gARE/ 2026-03-19T11:58:12.789288086Z time="2026-03-19T11:58:12Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=gARE/ 2026-03-19T11:58:12.789288086Z time="2026-03-19T11:58:12Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=gARE/ 2026-03-19T11:58:14.176508250Z time="2026-03-19T11:58:14Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=63Ir+ 2026-03-19T11:58:14.176508250Z time="2026-03-19T11:58:14Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=63Ir+ 2026-03-19T11:58:14.189589807Z time="2026-03-19T11:58:14Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=63Ir+ 2026-03-19T11:58:14.197818677Z time="2026-03-19T11:58:14Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-w2fqh current-pod.namespace=openshift-marketplace id=63Ir+ 2026-03-19T11:58:14.197818677Z time="2026-03-19T11:58:14Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-w2fqh current-pod.namespace=openshift-marketplace id=63Ir+ 2026-03-19T11:58:14.197818677Z time="2026-03-19T11:58:14Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=63Ir+ 2026-03-19T11:58:14.197818677Z time="2026-03-19T11:58:14Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=63Ir+ 2026-03-19T11:58:14.197818677Z time="2026-03-19T11:58:14Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=63Ir+ 2026-03-19T11:58:14.228497262Z time="2026-03-19T11:58:14Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=63Ir+ 2026-03-19T11:58:14.228497262Z time="2026-03-19T11:58:14Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-w2fqh current-pod.namespace=openshift-marketplace id=63Ir+ 2026-03-19T11:58:14.228497262Z time="2026-03-19T11:58:14Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-w2fqh current-pod.namespace=openshift-marketplace id=63Ir+ 2026-03-19T11:58:14.228497262Z time="2026-03-19T11:58:14Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=63Ir+ 2026-03-19T11:58:14.228497262Z time="2026-03-19T11:58:14Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=63Ir+ 2026-03-19T11:58:14.251200743Z time="2026-03-19T11:58:14Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=0gJ8e 2026-03-19T11:58:14.251200743Z time="2026-03-19T11:58:14Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=0gJ8e 2026-03-19T11:58:14.266360302Z time="2026-03-19T11:58:14Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=0gJ8e 2026-03-19T11:58:14.266482574Z time="2026-03-19T11:58:14Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-w2fqh current-pod.namespace=openshift-marketplace id=0gJ8e 2026-03-19T11:58:14.266482574Z time="2026-03-19T11:58:14Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-w2fqh current-pod.namespace=openshift-marketplace id=0gJ8e 2026-03-19T11:58:14.266482574Z time="2026-03-19T11:58:14Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=0gJ8e 2026-03-19T11:58:14.266482574Z time="2026-03-19T11:58:14Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=0gJ8e 2026-03-19T11:58:14.266497725Z time="2026-03-19T11:58:14Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=0gJ8e 2026-03-19T11:58:14.318824095Z time="2026-03-19T11:58:14Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=0gJ8e 2026-03-19T11:58:14.318824095Z time="2026-03-19T11:58:14Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-w2fqh current-pod.namespace=openshift-marketplace id=0gJ8e 2026-03-19T11:58:14.318824095Z time="2026-03-19T11:58:14Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-w2fqh current-pod.namespace=openshift-marketplace id=0gJ8e 2026-03-19T11:58:14.318824095Z time="2026-03-19T11:58:14Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=0gJ8e 2026-03-19T11:58:14.318824095Z time="2026-03-19T11:58:14Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=0gJ8e 2026-03-19T11:58:31.213815843Z time="2026-03-19T11:58:31Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BQ+qV 2026-03-19T11:58:31.213815843Z time="2026-03-19T11:58:31Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BQ+qV 2026-03-19T11:58:31.262040714Z time="2026-03-19T11:58:31Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BQ+qV 2026-03-19T11:58:31.262040714Z time="2026-03-19T11:58:31Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-w2fqh current-pod.namespace=openshift-marketplace id=BQ+qV 2026-03-19T11:58:31.262040714Z time="2026-03-19T11:58:31Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-w2fqh current-pod.namespace=openshift-marketplace id=BQ+qV 2026-03-19T11:58:31.262040714Z time="2026-03-19T11:58:31Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=BQ+qV 2026-03-19T11:58:31.262040714Z time="2026-03-19T11:58:31Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BQ+qV 2026-03-19T11:58:31.262040714Z time="2026-03-19T11:58:31Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BQ+qV 2026-03-19T11:58:31.319777935Z time="2026-03-19T11:58:31Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BQ+qV 2026-03-19T11:58:31.319777935Z time="2026-03-19T11:58:31Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-w2fqh current-pod.namespace=openshift-marketplace id=BQ+qV 2026-03-19T11:58:31.319777935Z time="2026-03-19T11:58:31Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-w2fqh current-pod.namespace=openshift-marketplace id=BQ+qV 2026-03-19T11:58:31.319777935Z time="2026-03-19T11:58:31Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BQ+qV 2026-03-19T11:58:31.319777935Z time="2026-03-19T11:58:31Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BQ+qV 2026-03-19T11:58:31.319777935Z time="2026-03-19T11:58:31Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rPXei 2026-03-19T11:58:31.319777935Z time="2026-03-19T11:58:31Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rPXei 2026-03-19T11:58:31.334390401Z time="2026-03-19T11:58:31Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rPXei 2026-03-19T11:58:31.334482083Z time="2026-03-19T11:58:31Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-w2fqh current-pod.namespace=openshift-marketplace id=rPXei 2026-03-19T11:58:31.334490973Z time="2026-03-19T11:58:31Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-w2fqh current-pod.namespace=openshift-marketplace id=rPXei 2026-03-19T11:58:31.334515934Z time="2026-03-19T11:58:31Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=rPXei 2026-03-19T11:58:31.334515934Z time="2026-03-19T11:58:31Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rPXei 2026-03-19T11:58:31.334523964Z time="2026-03-19T11:58:31Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rPXei 2026-03-19T11:58:31.365237470Z time="2026-03-19T11:58:31Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rPXei 2026-03-19T11:58:31.365359753Z time="2026-03-19T11:58:31Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-w2fqh current-pod.namespace=openshift-marketplace id=rPXei 2026-03-19T11:58:31.365359753Z time="2026-03-19T11:58:31Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-w2fqh current-pod.namespace=openshift-marketplace id=rPXei 2026-03-19T11:58:31.365450305Z time="2026-03-19T11:58:31Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rPXei 2026-03-19T11:58:31.365450305Z time="2026-03-19T11:58:31Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rPXei config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-9w7hc/etcd-operator_current.log0000640000000000000000000001120615156762350031212 0ustar00000000000000002026-03-19T11:55:54.307127368Z I0319 11:55:54.306831 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-03-19T11:55:54.307293742Z I0319 11:55:54.307166 1 observer_polling.go:159] Starting file observer 2026-03-19T11:55:54.307524927Z I0319 11:55:54.307474 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-19T11:55:54.307563038Z I0319 11:55:54.307527 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-19T11:55:54.308151963Z I0319 11:55:54.308115 1 observer_polling.go:159] Starting file observer 2026-03-19T11:56:54.320371090Z W0319 11:56:54.320271 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods etcd-operator-8544cbcf9c-9w7hc) 2026-03-19T11:56:54.320750640Z I0319 11:56:54.320683 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602261953.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934 2026-03-19T11:57:22.670005848Z I0319 11:57:22.668775 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-19T11:57:22.670005848Z W0319 11:57:22.668839 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:57:22.670005848Z W0319 11:57:22.668846 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:57:22.670005848Z W0319 11:57:22.668852 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-19T11:57:22.670005848Z W0319 11:57:22.668856 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-19T11:57:22.670005848Z W0319 11:57:22.668859 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-19T11:57:22.670005848Z W0319 11:57:22.668866 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-19T11:57:22.671002735Z I0319 11:57:22.670945 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-19T11:57:22.671467367Z I0319 11:57:22.671406 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... 2026-03-19T11:57:22.683788050Z I0319 11:57:22.674915 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-19T11:57:22.683788050Z I0319 11:57:22.674964 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-19T11:57:22.683788050Z I0319 11:57:22.675002 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:57:22.683788050Z I0319 11:57:22.675020 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:57:22.683788050Z I0319 11:57:22.675020 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-19T11:57:22.683788050Z I0319 11:57:22.675051 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:57:22.683788050Z I0319 11:57:22.675060 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:57:22.683788050Z I0319 11:57:22.675060 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-19T11:57:22.683788050Z I0319 11:57:22.675199 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-19T11:57:22.775867634Z I0319 11:57:22.775575 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:57:22.775867634Z I0319 11:57:22.775657 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-19T11:57:22.775867634Z I0319 11:57:22.775791 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-9w7hc/etcd-operator_previous.log0000640000000000000000000004250715156762350031414 0ustar00000000000000002026-03-19T11:54:26.279421028Z I0319 11:54:26.278396 1 base_controller.go:181] Shutting down etcd-Node ... 2026-03-19T11:54:26.279429048Z I0319 11:54:26.278402 1 envvarcontroller.go:252] Shutting down EnvVarController 2026-03-19T11:54:26.279437068Z I0319 11:54:26.278419 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-19T11:54:26.279464279Z I0319 11:54:26.279272 1 base_controller.go:159] All StatusSyncer_etcd post start hooks have been terminated 2026-03-19T11:54:26.279464279Z I0319 11:54:26.279453 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-19T11:54:26.279473499Z I0319 11:54:26.279462 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-19T11:54:26.279473499Z I0319 11:54:26.279453 1 base_controller.go:113] All etcd workers have been terminated 2026-03-19T11:54:26.279482099Z I0319 11:54:26.279472 1 controller_manager.go:54] GuardController controller terminated 2026-03-19T11:54:26.279482099Z I0319 11:54:26.279303 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-19T11:54:26.279490590Z I0319 11:54:26.279482 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-19T11:54:26.279490590Z I0319 11:54:26.279483 1 base_controller.go:113] All etcd-Node workers have been terminated 2026-03-19T11:54:26.279498930Z I0319 11:54:26.279423 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-19T11:54:26.279506890Z I0319 11:54:26.279496 1 controller_manager.go:54] etcd-Node controller terminated 2026-03-19T11:54:26.279531080Z E0319 11:54:26.279433 1 base_controller.go:279] "Unhandled Error" err="EtcdCertSignerController reconciliation failed: could not get current etcd-all-bundles configmap Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-all-bundles\": context canceled" 2026-03-19T11:54:26.279539851Z I0319 11:54:26.279498 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-19T11:54:26.279550641Z I0319 11:54:26.279438 1 base_controller.go:181] Shutting down Installer ... 2026-03-19T11:54:26.279558901Z I0319 11:54:26.279551 1 base_controller.go:113] All Installer workers have been terminated 2026-03-19T11:54:26.279566721Z I0319 11:54:26.279559 1 controller_manager.go:54] Installer controller terminated 2026-03-19T11:54:26.279574601Z I0319 11:54:26.278196 1 base_controller.go:181] Shutting down etcd-UnsupportedConfigOverrides ... 2026-03-19T11:54:26.279644213Z I0319 11:54:26.279573 1 base_controller.go:113] All etcd-UnsupportedConfigOverrides workers have been terminated 2026-03-19T11:54:26.279644213Z I0319 11:54:26.279465 1 base_controller.go:113] All StatusSyncer_etcd workers have been terminated 2026-03-19T11:54:26.279644213Z I0319 11:54:26.279593 1 base_controller.go:181] Shutting down PruneController ... 2026-03-19T11:54:26.279644213Z I0319 11:54:26.279612 1 base_controller.go:181] Shutting down ClusterMemberRemovalController ... 2026-03-19T11:54:26.279644213Z I0319 11:54:26.279619 1 base_controller.go:181] Shutting down ClusterMemberController ... 2026-03-19T11:54:26.279644213Z I0319 11:54:26.279628 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-19T11:54:26.279644213Z I0319 11:54:26.279641 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-19T11:54:26.279659303Z I0319 11:54:26.279645 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-19T11:54:26.279659303Z I0319 11:54:26.279652 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-19T11:54:26.279667273Z I0319 11:54:26.279659 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-19T11:54:26.279667273Z I0319 11:54:26.279661 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-19T11:54:26.279675744Z I0319 11:54:26.279665 1 controller_manager.go:54] PruneController controller terminated 2026-03-19T11:54:26.279675744Z I0319 11:54:26.279667 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-19T11:54:26.279683594Z I0319 11:54:26.279651 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-19T11:54:26.279683594Z I0319 11:54:26.279680 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-19T11:54:26.279691384Z I0319 11:54:26.279686 1 controller_manager.go:54] RevisionController controller terminated 2026-03-19T11:54:26.280332689Z E0319 11:54:26.280148 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-etcd-operator/leases/openshift-cluster-etcd-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-03-19T11:54:26.280332689Z E0319 11:54:26.280218 1 leaderelection.go:436] error retrieving resource lock openshift-etcd-operator/openshift-cluster-etcd-operator-lock: client rate limiter Wait returned an error: context canceled 2026-03-19T11:54:26.280332689Z I0319 11:54:26.280232 1 leaderelection.go:297] failed to renew lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock: timed out waiting for the condition 2026-03-19T11:54:26.280332689Z I0319 11:54:26.280254 1 base_controller.go:123] Shutting down worker of etcd-InstallerState controller ... 2026-03-19T11:54:26.280332689Z I0319 11:54:26.280269 1 base_controller.go:113] All etcd-InstallerState workers have been terminated 2026-03-19T11:54:26.280332689Z I0319 11:54:26.280275 1 controller_manager.go:54] etcd-InstallerState controller terminated 2026-03-19T11:54:26.280421161Z I0319 11:54:26.280400 1 base_controller.go:123] Shutting down worker of etcd-StaticPodState controller ... 2026-03-19T11:54:26.280430801Z I0319 11:54:26.280424 1 base_controller.go:113] All etcd-StaticPodState workers have been terminated 2026-03-19T11:54:26.280438391Z I0319 11:54:26.280431 1 controller_manager.go:54] etcd-StaticPodState controller terminated 2026-03-19T11:54:26.280446611Z I0319 11:54:26.280437 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-19T11:54:26.280481172Z I0319 11:54:26.280461 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-19T11:54:26.280481172Z I0319 11:54:26.280473 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-19T11:54:26.280496282Z E0319 11:54:26.280484 1 base_controller.go:279] "Unhandled Error" err="ScriptController reconciliation failed: \"configmap/etcd-pod\": Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-scripts\": context canceled" 2026-03-19T11:54:26.280548914Z I0319 11:54:26.280516 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"d6496f62-a387-4a0e-bc8a-a30254501e6d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ScriptControllerErrorUpdatingStatus' client rate limiter Wait returned an error: context canceled 2026-03-19T11:54:26.281848393Z I0319 11:54:26.280559 1 base_controller.go:123] Shutting down worker of EtcdCertSignerController controller ... 2026-03-19T11:54:26.281848393Z I0319 11:54:26.280577 1 base_controller.go:113] All EtcdCertSignerController workers have been terminated 2026-03-19T11:54:26.281848393Z E0319 11:54:26.281286 1 base_controller.go:279] "Unhandled Error" err="EtcdStaticResources-StaticResources reconciliation failed: [\"etcd/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd\": context canceled, \"etcd/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/minimal-sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-cr.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"EtcdStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:54:26.281848393Z I0319 11:54:26.281521 1 base_controller.go:123] Shutting down worker of ScriptController controller ... 2026-03-19T11:54:26.281848393Z I0319 11:54:26.281539 1 base_controller.go:113] All ScriptController workers have been terminated 2026-03-19T11:54:26.282013237Z E0319 11:54:26.281969 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-19T11:54:26.283375997Z I0319 11:54:26.283143 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-19T11:54:26.283375997Z I0319 11:54:26.283170 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-19T11:54:26.283375997Z I0319 11:54:26.283185 1 base_controller.go:123] Shutting down worker of EtcdStaticResources-StaticResources controller ... 2026-03-19T11:54:26.283375997Z I0319 11:54:26.283209 1 base_controller.go:113] All EtcdStaticResources-StaticResources workers have been terminated 2026-03-19T11:54:27.803905964Z I0319 11:54:27.803839 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:54:27.907541044Z I0319 11:54:27.907455 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:54:30.719803135Z I0319 11:54:30.719642 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-service-ca/service-ca.crt" has been created (hash="637e36ae33cef8fb9ee3e66325b410f753d7ed614712c2dbbde05844aeb055e6") 2026-03-19T11:54:30.719803135Z I0319 11:54:30.719785 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-service-ca/service-ca.crt" changed 2026-03-19T11:54:30.719888396Z I0319 11:54:30.719869 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="3875a0db69cb32147d3dd6fc7bf482ce87b893f4cc8407544338883741f75a04") 2026-03-19T11:54:30.719888396Z I0319 11:54:30.719879 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.crt" changed 2026-03-19T11:54:30.719969068Z I0319 11:54:30.719935 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="b325e37c6144223d896603675605e0adeb9d0f1a3a33d89eee4256531606c2e1") 2026-03-19T11:54:30.719969068Z I0319 11:54:30.719950 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.key" changed 2026-03-19T11:54:30.720044940Z I0319 11:54:30.720012 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.crt" has been modified (old="", new="62f1d9734d166302505d81555907d748db351c24157f9dbb20aeaa9ddbf5f071") 2026-03-19T11:54:30.720044940Z I0319 11:54:30.720030 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.crt" changed 2026-03-19T11:54:30.720124092Z I0319 11:54:30.720090 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.key" has been modified (old="", new="3d9a63d58fd3f54f56cf2e6d193c43b82e2f707411a2b990c9563420eaacf944") 2026-03-19T11:54:30.720124092Z I0319 11:54:30.720111 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.key" changed 2026-03-19T11:54:30.720232824Z I0319 11:54:30.720197 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-ca/ca-bundle.crt" has been created (hash="64c2eac55ce85b1b506dff9ec802f601108b2c46820749d30dc1270dcec44988") 2026-03-19T11:54:30.720232824Z I0319 11:54:30.720222 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-ca/ca-bundle.crt" changed 2026-03-19T11:54:31.277241018Z I0319 11:54:31.277139 1 observer_polling.go:162] Shutting down file observer 2026-03-19T11:54:39.293475741Z W0319 11:54:39.293403 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-19T11:54:39.293749547Z E0319 11:54:39.293708 1 base_controller.go:279] "Unhandled Error" err="EtcdEndpointsController reconciliation failed: failed to get member list: giving up getting a cached client after 3 tries" 2026-03-19T11:54:39.294986215Z I0319 11:54:39.294934 1 base_controller.go:123] Shutting down worker of EtcdEndpointsController controller ... 2026-03-19T11:54:39.295004066Z I0319 11:54:39.294998 1 base_controller.go:113] All EtcdEndpointsController workers have been terminated 2026-03-19T11:54:40.085259865Z W0319 11:54:40.085130 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-19T11:54:40.490217109Z W0319 11:54:40.490154 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-19T11:54:42.806111699Z W0319 11:54:42.806013 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-19T11:54:42.806390385Z E0319 11:54:42.806354 1 base_controller.go:279] "Unhandled Error" err="EtcdMembersController reconciliation failed: giving up getting a cached client after 3 tries" 2026-03-19T11:54:42.807601002Z I0319 11:54:42.807546 1 base_controller.go:123] Shutting down worker of EtcdMembersController controller ... 2026-03-19T11:54:42.807601002Z I0319 11:54:42.807590 1 base_controller.go:113] All EtcdMembersController workers have been terminated 2026-03-19T11:54:42.909257408Z W0319 11:54:42.909145 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-19T11:54:42.909337130Z E0319 11:54:42.909245 1 base_controller.go:279] "Unhandled Error" err="BootstrapTeardownController reconciliation failed: error while canRemoveEtcdBootstrap: giving up getting a cached client after 3 tries" 2026-03-19T11:54:42.910528886Z I0319 11:54:42.910449 1 base_controller.go:123] Shutting down worker of BootstrapTeardownController controller ... 2026-03-19T11:54:42.910528886Z I0319 11:54:42.910504 1 base_controller.go:113] All BootstrapTeardownController workers have been terminated 2026-03-19T11:54:44.085490244Z I0319 11:54:44.085407 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:54:44.490375317Z I0319 11:54:44.490293 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:54:59.088064890Z W0319 11:54:59.087987 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-19T11:54:59.089297088Z E0319 11:54:59.089251 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberController reconciliation failed: could not get list of unhealthy members: giving up getting a cached client after 3 tries" 2026-03-19T11:54:59.091002116Z I0319 11:54:59.090929 1 base_controller.go:123] Shutting down worker of ClusterMemberController controller ... 2026-03-19T11:54:59.091002116Z I0319 11:54:59.090979 1 base_controller.go:113] All ClusterMemberController workers have been terminated 2026-03-19T11:54:59.492202976Z W0319 11:54:59.491804 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-19T11:54:59.493369732Z E0319 11:54:59.493319 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberRemovalController reconciliation failed: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries" 2026-03-19T11:54:59.494679232Z I0319 11:54:59.494634 1 base_controller.go:123] Shutting down worker of ClusterMemberRemovalController controller ... 2026-03-19T11:54:59.494679232Z I0319 11:54:59.494669 1 base_controller.go:113] All ClusterMemberRemovalController workers have been terminated 2026-03-19T11:55:00.284386757Z E0319 11:55:00.284325 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-19T11:55:00.284510090Z W0319 11:55:00.284495 1 leaderelection.go:84] leader election lost config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-9w7hc.json0000640000000000000000000001576315156762350024140 0ustar0000000000000000{"metadata":{"name":"etcd-operator-8544cbcf9c-9w7hc","generateName":"etcd-operator-8544cbcf9c-","namespace":"openshift-etcd-operator","uid":"8fe4839d-cef4-4ec9-b146-2ae9b76d8a76","resourceVersion":"9204","creationTimestamp":"2026-03-19T11:51:31Z","labels":{"app":"etcd-operator","pod-template-hash":"8544cbcf9c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.23/23\"],\"mac_address\":\"0a:58:0a:80:00:17\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.23/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.23\"\n ],\n \"mac\": \"0a:58:0a:80:00:17\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-8544cbcf9c","uid":"1e3cb53d-4dd4-4f96-9e85-f7aa13ee154f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-dnl28","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.35"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-dnl28","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:49Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:49Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.23","podIPs":[{"ip":"10.128.0.23"}],"startTime":"2026-03-19T11:52:49Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-03-19T11:55:54Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-19T11:53:20Z","finishedAt":"2026-03-19T11:55:00Z","containerID":"cri-o://b1921d5234eb4af4d7731c20be87a9595434841b33d272f8f2c3ade584fe4c62"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","containerID":"cri-o://3d5a7dbfa3497c92e61b4edeb7e66bb18bf811b923a65cdd5130c751b03363dc","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-dnl28","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000002745715156762350034006 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-f67f6868b-chx8j2026-03-19T11:53:50.927587798Z W0319 11:53:50.927375 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-19T11:53:50.928352756Z I0319 11:53:50.928329 1 crypto.go:601] Generating new CA for check-endpoints-signer@1773921230 cert, and key in /tmp/serving-cert-3146764504/serving-signer.crt, /tmp/serving-cert-3146764504/serving-signer.key 2026-03-19T11:53:52.361954399Z I0319 11:53:52.358966 1 observer_polling.go:159] Starting file observer 2026-03-19T11:53:52.515248816Z I0319 11:53:52.514773 1 builder.go:304] check-endpoints version 4.18.0-202602261953.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-19T11:53:52.517077737Z I0319 11:53:52.515835 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-3146764504/tls.crt::/tmp/serving-cert-3146764504/tls.key" 2026-03-19T11:53:54.249604311Z I0319 11:53:54.249529 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-19T11:53:54.252684120Z I0319 11:53:54.252609 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-19T11:53:54.252684120Z I0319 11:53:54.252659 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-19T11:53:54.252711571Z I0319 11:53:54.252691 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-19T11:53:54.252756822Z I0319 11:53:54.252719 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-19T11:53:54.269011768Z I0319 11:53:54.268937 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-19T11:53:54.269011768Z W0319 11:53:54.268969 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:53:54.269011768Z W0319 11:53:54.268975 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:53:54.269011768Z W0319 11:53:54.268979 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-19T11:53:54.269011768Z W0319 11:53:54.268983 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-19T11:53:54.269011768Z W0319 11:53:54.268986 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-19T11:53:54.269011768Z W0319 11:53:54.268989 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-19T11:53:54.269360095Z I0319 11:53:54.269328 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-19T11:53:54.328823423Z I0319 11:53:54.324317 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3146764504/tls.crt::/tmp/serving-cert-3146764504/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773921230\" (2026-03-19 11:53:50 +0000 UTC to 2026-04-18 11:53:51 +0000 UTC (now=2026-03-19 11:53:54.32426614 +0000 UTC))" 2026-03-19T11:53:54.328823423Z I0319 11:53:54.324467 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773921233\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773921232\" (2026-03-19 10:53:52 +0000 UTC to 2027-03-19 10:53:52 +0000 UTC (now=2026-03-19 11:53:54.324431444 +0000 UTC))" 2026-03-19T11:53:54.328823423Z I0319 11:53:54.324484 1 secure_serving.go:213] Serving securely on [::]:17698 2026-03-19T11:53:54.328823423Z I0319 11:53:54.324508 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-19T11:53:54.328823423Z I0319 11:53:54.324527 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-19T11:53:54.328823423Z I0319 11:53:54.324565 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-19T11:53:54.328823423Z I0319 11:53:54.324590 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-3146764504/tls.crt::/tmp/serving-cert-3146764504/tls.key" 2026-03-19T11:53:54.328823423Z I0319 11:53:54.324711 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-19T11:53:54.328823423Z I0319 11:53:54.324870 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:53:54.328823423Z I0319 11:53:54.324878 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:53:54.328823423Z I0319 11:53:54.324908 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:53:54.328823423Z I0319 11:53:54.324913 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:53:54.328823423Z I0319 11:53:54.324996 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-19T11:53:54.328823423Z I0319 11:53:54.325002 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-19T11:53:54.334789057Z I0319 11:53:54.334545 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:53:54.338106011Z I0319 11:53:54.337906 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:53:54.338384998Z I0319 11:53:54.338355 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:53:54.424912873Z I0319 11:53:54.424813 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-19T11:53:54.425042905Z I0319 11:53:54.425020 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:53:54.425069856Z I0319 11:53:54.425054 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:53:54.425295532Z I0319 11:53:54.425257 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-19 11:43:01 +0000 UTC to 2026-03-20 11:43:01 +0000 UTC (now=2026-03-19 11:53:54.42521899 +0000 UTC))" 2026-03-19T11:53:54.425509717Z I0319 11:53:54.425478 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3146764504/tls.crt::/tmp/serving-cert-3146764504/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773921230\" (2026-03-19 11:53:50 +0000 UTC to 2026-04-18 11:53:51 +0000 UTC (now=2026-03-19 11:53:54.425457825 +0000 UTC))" 2026-03-19T11:53:54.425651030Z I0319 11:53:54.425626 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773921233\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773921232\" (2026-03-19 10:53:52 +0000 UTC to 2027-03-19 10:53:52 +0000 UTC (now=2026-03-19 11:53:54.425611769 +0000 UTC))" 2026-03-19T11:53:54.425827543Z I0319 11:53:54.425791 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-19 11:36:25 +0000 UTC to 2036-03-16 11:36:25 +0000 UTC (now=2026-03-19 11:53:54.425776262 +0000 UTC))" 2026-03-19T11:53:54.425827543Z I0319 11:53:54.425818 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-19 11:43:03 +0000 UTC to 2026-03-20 11:43:03 +0000 UTC (now=2026-03-19 11:53:54.425808253 +0000 UTC))" 2026-03-19T11:53:54.425843864Z I0319 11:53:54.425832 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-19 11:43:03 +0000 UTC to 2027-03-19 11:43:03 +0000 UTC (now=2026-03-19 11:53:54.425823473 +0000 UTC))" 2026-03-19T11:53:54.425885835Z I0319 11:53:54.425861 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-19 11:43:04 +0000 UTC to 2027-03-19 11:43:04 +0000 UTC (now=2026-03-19 11:53:54.425838574 +0000 UTC))" 2026-03-19T11:53:54.425885835Z I0319 11:53:54.425880 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-19 11:43:00 +0000 UTC to 2036-03-16 11:43:00 +0000 UTC (now=2026-03-19 11:53:54.425870684 +0000 UTC))" 2026-03-19T11:53:54.425927416Z I0319 11:53:54.425902 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-19 11:43:01 +0000 UTC to 2026-03-20 11:43:01 +0000 UTC (now=2026-03-19 11:53:54.425886925 +0000 UTC))" 2026-03-19T11:53:54.426058099Z I0319 11:53:54.426021 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3146764504/tls.crt::/tmp/serving-cert-3146764504/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773921230\" (2026-03-19 11:53:50 +0000 UTC to 2026-04-18 11:53:51 +0000 UTC (now=2026-03-19 11:53:54.426007647 +0000 UTC))" 2026-03-19T11:53:54.426142690Z I0319 11:53:54.426115 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773921233\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773921232\" (2026-03-19 10:53:52 +0000 UTC to 2027-03-19 10:53:52 +0000 UTC (now=2026-03-19 11:53:54.42610488 +0000 UTC))" 2026-03-19T11:53:54.503572652Z I0319 11:53:54.503504 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-03-19T11:53:54.866425730Z I0319 11:53:54.866312 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:53:54.905817156Z I0319 11:53:54.903721 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-03-19T11:53:54.905817156Z I0319 11:53:54.903896 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-f67f6868b-chx8j/openshift-apiserver_current.log0000640000000000000000000011502215156762350030773 0ustar00000000000000002026-03-19T11:58:09.508690527Z E0319 11:58:09.508655 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.508934193Z E0319 11:58:09.508867 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.508994264Z E0319 11:58:09.508409 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.512788697Z E0319 11:58:09.512717 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.512811267Z E0319 11:58:09.512781 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.512956991Z E0319 11:58:09.512935 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.513109074Z E0319 11:58:09.513078 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.513249558Z E0319 11:58:09.513219 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.517355197Z E0319 11:58:09.517310 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.517355197Z E0319 11:58:09.517319 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.517551182Z E0319 11:58:09.517500 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.517662805Z E0319 11:58:09.517631 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.517746067Z E0319 11:58:09.517703 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.518375012Z E0319 11:58:09.517875 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.518375012Z E0319 11:58:09.517897 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.518375012Z E0319 11:58:09.518013 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.518375012Z E0319 11:58:09.518026 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.518375012Z E0319 11:58:09.518098 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.518375012Z E0319 11:58:09.518207 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.518375012Z E0319 11:58:09.518261 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.518375012Z E0319 11:58:09.518274 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.518375012Z E0319 11:58:09.518278 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.518433814Z E0319 11:58:09.518407 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.523355023Z E0319 11:58:09.523296 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.523440585Z E0319 11:58:09.523401 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.523540357Z E0319 11:58:09.523502 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.523540357Z E0319 11:58:09.523522 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.523655070Z E0319 11:58:09.523625 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.524194434Z E0319 11:58:09.523757 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.524194434Z E0319 11:58:09.523790 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.524194434Z E0319 11:58:09.523792 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.524194434Z E0319 11:58:09.523865 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.524194434Z E0319 11:58:09.523851 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.591886407Z E0319 11:58:09.591786 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.592229515Z E0319 11:58:09.592187 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.597921293Z E0319 11:58:09.597881 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.598424026Z E0319 11:58:09.598402 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.607828634Z E0319 11:58:09.606530 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.613220245Z E0319 11:58:09.613177 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.613368548Z E0319 11:58:09.613347 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.621839585Z E0319 11:58:09.621815 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.622170303Z E0319 11:58:09.622146 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.627121102Z E0319 11:58:09.627088 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.627162493Z E0319 11:58:09.627097 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.639323169Z E0319 11:58:09.637302 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.644010002Z E0319 11:58:09.643944 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.644124615Z E0319 11:58:09.644087 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.650810528Z E0319 11:58:09.650765 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.650928040Z E0319 11:58:09.650904 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.657221154Z E0319 11:58:09.656904 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.661949148Z E0319 11:58:09.661876 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:17.527288182Z I0319 11:58:17.527199 1 policy_source.go:224] refreshing policies 2026-03-19T11:58:17.548415475Z I0319 11:58:17.548321 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-19T11:58:17.553485138Z I0319 11:58:17.553453 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:58:18.555697114Z I0319 11:58:18.555627 1 policy_source.go:224] refreshing policies 2026-03-19T11:58:18.700193082Z E0319 11:58:18.700093 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:18.700461799Z E0319 11:58:18.700427 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:18.700512500Z E0319 11:58:18.700466 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:18.700520801Z E0319 11:58:18.700496 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:18.700595492Z E0319 11:58:18.700547 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:18.756774336Z E0319 11:58:18.755330 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:18.756774336Z E0319 11:58:18.755379 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:18.756774336Z E0319 11:58:18.755659 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:18.756774336Z E0319 11:58:18.755845 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:18.756774336Z E0319 11:58:18.755862 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.033568497Z E0319 11:58:19.033470 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.033568497Z E0319 11:58:19.033554 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.033712461Z E0319 11:58:19.033470 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.034154122Z E0319 11:58:19.033990 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.034154122Z E0319 11:58:19.034021 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.451722321Z E0319 11:58:19.451634 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.451722321Z E0319 11:58:19.451673 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.451722321Z E0319 11:58:19.451699 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.451901695Z E0319 11:58:19.451852 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.451901695Z E0319 11:58:19.451886 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.730601472Z E0319 11:58:19.728498 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.730601472Z E0319 11:58:19.728815 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.730601472Z E0319 11:58:19.728874 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.730601472Z E0319 11:58:19.729851 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.730601472Z E0319 11:58:19.730039 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.730601472Z E0319 11:58:19.730269 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.730601472Z E0319 11:58:19.730422 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.730636643Z E0319 11:58:19.730597 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.730781856Z E0319 11:58:19.730719 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.731670178Z E0319 11:58:19.730960 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.731670178Z E0319 11:58:19.731132 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.731670178Z E0319 11:58:19.731408 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.731670178Z E0319 11:58:19.731637 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.732331915Z E0319 11:58:19.731840 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.733784060Z E0319 11:58:19.732986 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:30.063201904Z E0319 11:58:30.063126 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:30.063201904Z E0319 11:58:30.063154 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:30.063270536Z E0319 11:58:30.063126 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:30.063348408Z E0319 11:58:30.063154 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:30.063440600Z E0319 11:58:30.063410 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:30.490268424Z E0319 11:58:30.477550 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:30.490268424Z E0319 11:58:30.478026 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:30.490268424Z E0319 11:58:30.485190 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:30.490268424Z E0319 11:58:30.485702 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:30.490268424Z E0319 11:58:30.485747 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000001001315156762350040061 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-d65958b8-6hsqn2026-03-19T11:56:28.247206158Z I0319 11:56:28.247025 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-19T11:56:28.247206158Z I0319 11:56:28.247150 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-19T11:56:28.247592049Z I0319 11:56:28.247482 1 observer_polling.go:159] Starting file observer 2026-03-19T11:57:12.718326764Z I0319 11:57:12.718254 1 builder.go:304] openshift-apiserver-operator version - 2026-03-19T11:57:22.658963599Z I0319 11:57:22.657221 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-19T11:57:22.658963599Z W0319 11:57:22.657255 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:57:22.658963599Z W0319 11:57:22.657260 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:57:22.658963599Z W0319 11:57:22.657265 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-19T11:57:22.658963599Z W0319 11:57:22.657269 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-19T11:57:22.658963599Z W0319 11:57:22.657272 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-19T11:57:22.658963599Z W0319 11:57:22.657276 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-19T11:57:22.661138339Z I0319 11:57:22.661083 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-19T11:57:22.661597821Z I0319 11:57:22.661470 1 leaderelection.go:254] attempting to acquire leader lease openshift-apiserver-operator/openshift-apiserver-operator-lock... 2026-03-19T11:57:22.662710971Z I0319 11:57:22.662669 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-19T11:57:22.662772093Z I0319 11:57:22.662745 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-19T11:57:22.662806433Z I0319 11:57:22.662782 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-19T11:57:22.662945537Z I0319 11:57:22.662926 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-19T11:57:22.663084371Z I0319 11:57:22.662788 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-19T11:57:22.663315257Z I0319 11:57:22.663287 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:57:22.663315257Z I0319 11:57:22.663307 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:57:22.663328927Z I0319 11:57:22.663317 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:57:22.663351968Z I0319 11:57:22.663334 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:57:22.765826863Z I0319 11:57:22.765468 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:57:22.766605135Z I0319 11:57:22.766529 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:57:22.766605135Z I0319 11:57:22.766581 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController openshift-apiserver-operator_previous.log0000640000000000000000000004306415156762350040267 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-d65958b8-6hsqn2026-03-19T11:54:12.312772333Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/route.openshift.io/v1: 401 2026-03-19T11:54:12.312772333Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/security.openshift.io/v1: 401 2026-03-19T11:54:12.312772333Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/template.openshift.io/v1: 401 2026-03-19T11:54:12.312772333Z > 2026-03-19T11:54:14.009886810Z E0319 11:54:14.008917 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-19T11:54:14.009886810Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/apps.openshift.io/v1: 401 2026-03-19T11:54:14.009886810Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: 401 2026-03-19T11:54:14.009886810Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/build.openshift.io/v1: 401 2026-03-19T11:54:14.009886810Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/image.openshift.io/v1: 401 2026-03-19T11:54:14.009886810Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/project.openshift.io/v1: 401 2026-03-19T11:54:14.009886810Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/quota.openshift.io/v1: 401 2026-03-19T11:54:14.009886810Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/route.openshift.io/v1: 401 2026-03-19T11:54:14.009886810Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/security.openshift.io/v1: 401 2026-03-19T11:54:14.009886810Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/template.openshift.io/v1: 401 2026-03-19T11:54:14.009886810Z > 2026-03-19T11:54:32.373614829Z I0319 11:54:32.373498 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="1e23feaca90f81e2a4335d584859039a89ca93bdaef863031234981a44186881") 2026-03-19T11:54:32.373614829Z W0319 11:54:32.373559 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-19T11:54:32.373898715Z I0319 11:54:32.373651 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="ca3334894abe5ba59e44e1559b9fa169e95e6ac2040d588e9aa4b3db39557583") 2026-03-19T11:54:32.373898715Z I0319 11:54:32.373703 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-19T11:54:32.373898715Z I0319 11:54:32.373784 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-19T11:54:32.373898715Z I0319 11:54:32.373842 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-19T11:54:32.374014268Z I0319 11:54:32.373979 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-19T11:54:32.374014268Z I0319 11:54:32.373982 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionKey ... 2026-03-19T11:54:32.374053129Z I0319 11:54:32.374027 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-19T11:54:32.374067659Z I0319 11:54:32.374051 1 base_controller.go:181] Shutting down OpenShiftAPIServer-WorkloadWorkloadController ... 2026-03-19T11:54:32.374078989Z I0319 11:54:32.374067 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-19T11:54:32.374078989Z I0319 11:54:32.374071 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-19T11:54:32.374090119Z I0319 11:54:32.374082 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionPrune ... 2026-03-19T11:54:32.374119740Z I0319 11:54:32.374099 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionCondition ... 2026-03-19T11:54:32.374127670Z I0319 11:54:32.374120 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionState ... 2026-03-19T11:54:32.374136520Z I0319 11:54:32.374125 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:54:32.374143741Z I0319 11:54:32.374136 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionKey controller ... 2026-03-19T11:54:32.374152621Z I0319 11:54:32.374146 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:54:32.374159961Z I0319 11:54:32.374152 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-19T11:54:32.374167351Z I0319 11:54:32.374162 1 base_controller.go:123] Shutting down worker of OpenShiftAPIServer-WorkloadWorkloadController controller ... 2026-03-19T11:54:32.374175981Z I0319 11:54:32.374170 1 base_controller.go:113] All OpenShiftAPIServer-WorkloadWorkloadController workers have been terminated 2026-03-19T11:54:32.374208062Z I0319 11:54:32.374180 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionMigration controller ... 2026-03-19T11:54:32.374208062Z I0319 11:54:32.374183 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-19T11:54:32.374208062Z I0319 11:54:32.374195 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionPrune controller ... 2026-03-19T11:54:32.374217142Z I0319 11:54:32.374197 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-19T11:54:32.374217142Z I0319 11:54:32.374208 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionState controller ... 2026-03-19T11:54:32.374259913Z I0319 11:54:32.374210 1 base_controller.go:181] Shutting down SecretRevisionPruneController ... 2026-03-19T11:54:32.374259913Z I0319 11:54:32.374199 1 base_controller.go:181] Shutting down openshift-apiserver ... 2026-03-19T11:54:32.374268303Z I0319 11:54:32.374070 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionMigration ... 2026-03-19T11:54:32.374275583Z I0319 11:54:32.374265 1 base_controller.go:181] Shutting down APIServerStaticResources-StaticResources ... 2026-03-19T11:54:32.374275583Z E0319 11:54:32.374241 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-apiserver reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-apiserver\": context canceled" 2026-03-19T11:54:32.374283084Z I0319 11:54:32.374263 1 base_controller.go:181] Shutting down StatusSyncer_openshift-apiserver ... 2026-03-19T11:54:32.374307384Z I0319 11:54:32.374286 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-19T11:54:32.374307384Z I0319 11:54:32.374290 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-03-19T11:54:32.374315404Z I0319 11:54:32.374302 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-19T11:54:32.374322864Z I0319 11:54:32.374202 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionCondition controller ... 2026-03-19T11:54:32.374322864Z I0319 11:54:32.374316 1 builder.go:335] server exited 2026-03-19T11:54:32.374330325Z I0319 11:54:32.374303 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-03-19T11:54:32.374337695Z I0319 11:54:32.374328 1 base_controller.go:113] All openshift-apiserver-EncryptionCondition workers have been terminated 2026-03-19T11:54:32.374337695Z I0319 11:54:32.374294 1 base_controller.go:159] All StatusSyncer_openshift-apiserver post start hooks have been terminated 2026-03-19T11:54:32.374346655Z I0319 11:54:32.374276 1 base_controller.go:113] All openshift-apiserver-EncryptionMigration workers have been terminated 2026-03-19T11:54:32.374355305Z I0319 11:54:32.374304 1 base_controller.go:181] Shutting down openshift-apiserver-RemoveStaleConditions ... 2026-03-19T11:54:32.374362515Z I0319 11:54:32.374239 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-19T11:54:32.374362515Z I0319 11:54:32.374338 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2026-03-19T11:54:32.374404616Z I0319 11:54:32.374383 1 base_controller.go:123] Shutting down worker of openshift-apiserver-RemoveStaleConditions controller ... 2026-03-19T11:54:32.374412996Z I0319 11:54:32.374403 1 base_controller.go:113] All openshift-apiserver-RemoveStaleConditions workers have been terminated 2026-03-19T11:54:32.374423367Z I0319 11:54:32.374416 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-19T11:54:32.374471008Z I0319 11:54:32.374432 1 base_controller.go:123] Shutting down worker of openshift-apiserver controller ... 2026-03-19T11:54:32.374471008Z I0319 11:54:32.374464 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2026-03-19T11:54:32.374481698Z I0319 11:54:32.374451 1 base_controller.go:181] Shutting down ConnectivityCheckController ... 2026-03-19T11:54:32.374481698Z I0319 11:54:32.374474 1 base_controller.go:113] All openshift-apiserver workers have been terminated 2026-03-19T11:54:32.374494928Z I0319 11:54:32.374478 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2026-03-19T11:54:32.374536790Z I0319 11:54:32.374514 1 base_controller.go:113] All openshift-apiserver-EncryptionState workers have been terminated 2026-03-19T11:54:32.374536790Z I0319 11:54:32.374517 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1292635903/tls.crt::/tmp/serving-cert-1292635903/tls.key" 2026-03-19T11:54:32.374536790Z I0319 11:54:32.374531 1 base_controller.go:181] Shutting down openshift-apiserver-UnsupportedConfigOverrides ... 2026-03-19T11:54:32.374545980Z I0319 11:54:32.374538 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-19T11:54:32.374553241Z I0319 11:54:32.374546 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-19T11:54:32.374561311Z I0319 11:54:32.374553 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-19T11:54:32.374561311Z I0319 11:54:32.374557 1 base_controller.go:123] Shutting down worker of openshift-apiserver-UnsupportedConfigOverrides controller ... 2026-03-19T11:54:32.374568861Z I0319 11:54:32.374559 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-19T11:54:32.374568861Z I0319 11:54:32.374564 1 base_controller.go:113] All openshift-apiserver-UnsupportedConfigOverrides workers have been terminated 2026-03-19T11:54:32.374576391Z I0319 11:54:32.374562 1 base_controller.go:113] All openshift-apiserver-EncryptionKey workers have been terminated 2026-03-19T11:54:32.374576391Z I0319 11:54:32.374572 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-19T11:54:32.374584191Z E0319 11:54:32.374563 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the operator is shutting down, skipping updating conditions, err = failed to reconcile enabled APIs: [Get \"https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices/v1.image.openshift.io\": context canceled, client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:54:32.374584191Z I0319 11:54:32.374579 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-19T11:54:32.374593261Z I0319 11:54:32.374575 1 base_controller.go:123] Shutting down worker of StatusSyncer_openshift-apiserver controller ... 2026-03-19T11:54:32.374627472Z I0319 11:54:32.374067 1 base_controller.go:181] Shutting down NamespaceFinalizerController_openshift-apiserver ... 2026-03-19T11:54:32.374627472Z I0319 11:54:32.374602 1 base_controller.go:113] All StatusSyncer_openshift-apiserver workers have been terminated 2026-03-19T11:54:32.374796626Z I0319 11:54:32.374758 1 base_controller.go:113] All openshift-apiserver-EncryptionPrune workers have been terminated 2026-03-19T11:54:32.374815776Z E0319 11:54:32.374800 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-03-19T11:54:32.374913018Z E0319 11:54:32.374852 1 leaderelection.go:436] error retrieving resource lock openshift-apiserver-operator/openshift-apiserver-operator-lock: client rate limiter Wait returned an error: context canceled 2026-03-19T11:54:32.374926929Z I0319 11:54:32.374908 1 leaderelection.go:297] failed to renew lease openshift-apiserver-operator/openshift-apiserver-operator-lock: timed out waiting for the condition 2026-03-19T11:54:32.376767520Z E0319 11:54:32.375635 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-19T11:54:32.376767520Z I0319 11:54:32.375705 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-apiserver controller ... 2026-03-19T11:54:32.376767520Z I0319 11:54:32.375712 1 base_controller.go:113] All NamespaceFinalizerController_openshift-apiserver workers have been terminated 2026-03-19T11:54:32.376767520Z I0319 11:54:32.375752 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-03-19T11:54:32.376767520Z I0319 11:54:32.375763 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-03-19T11:54:32.376767520Z E0319 11:54:32.376277 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"v3.11.0/openshift-apiserver/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-apiserver\": context canceled, \"v3.11.0/openshift-apiserver/apiserver-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/pdb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:54:32.376767520Z I0319 11:54:32.376684 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-19T11:54:32.376767520Z I0319 11:54:32.376696 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-19T11:54:32.377583839Z I0319 11:54:32.377539 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-03-19T11:54:32.377583839Z I0319 11:54:32.377560 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-03-19T11:54:37.373312620Z I0319 11:54:37.373207 1 observer_polling.go:162] Shutting down file observer 2026-03-19T11:55:06.378669160Z E0319 11:55:06.378548 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-19T11:55:06.378669160Z W0319 11:55:06.378594 1 leaderelection.go:84] leader election lost config/pod/openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-6hsqn.json0000640000000000000000000001442615156762350030010 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-d65958b8-6hsqn","generateName":"openshift-apiserver-operator-d65958b8-","namespace":"openshift-apiserver-operator","uid":"66f88242-8b0b-4790-bbb6-445c19b34ee7","resourceVersion":"9207","creationTimestamp":"2026-03-19T11:51:31Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"d65958b8"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.21/23\"],\"mac_address\":\"0a:58:0a:80:00:15\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.21/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.21\"\n ],\n \"mac\": \"0a:58:0a:80:00:15\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-d65958b8","uid":"8b82fb77-8d29-486a-9262-072bb9ff78f0","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-p5fnx","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.35"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-p5fnx","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c15,c0"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:49Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:12Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:12Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:49Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.21","podIPs":[{"ip":"10.128.0.21"}],"startTime":"2026-03-19T11:52:49Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-03-19T11:56:28Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-19T11:53:16Z","finishedAt":"2026-03-19T11:55:06Z","containerID":"cri-o://f48ebfe02dc1f93683f1d2eea873f5d0c2c3081e3483e2d09faebd411fa396ef"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","containerID":"cri-o://aef3135a4740b3f0892de4712851aedbced779bb92df87ab75f715d784560839","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-p5fnx","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000001067315156762350043002 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-dddff6458-4wj9n2026-03-19T11:55:54.343681497Z I0319 11:55:54.343321 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-19T11:55:54.343681497Z I0319 11:55:54.343588 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-19T11:55:54.344420176Z I0319 11:55:54.344395 1 observer_polling.go:159] Starting file observer 2026-03-19T11:56:54.351352756Z W0319 11:56:54.351170 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-kube-scheduler-operator-dddff6458-4wj9n) 2026-03-19T11:56:54.351433589Z I0319 11:56:54.351391 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202603040208.p2.g4e99db6.assembly.stream.el9-4e99db6-4e99db62cea1d2ca48765230c6f5663d1f2c2702 2026-03-19T11:57:22.679995437Z I0319 11:57:22.679939 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-19T11:57:22.684961472Z W0319 11:57:22.684931 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:57:22.685062464Z W0319 11:57:22.685051 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:57:22.685090395Z W0319 11:57:22.685080 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-19T11:57:22.685114356Z W0319 11:57:22.685105 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-19T11:57:22.685137526Z W0319 11:57:22.685128 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-19T11:57:22.685178367Z W0319 11:57:22.685168 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-19T11:57:22.685747182Z I0319 11:57:22.683920 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-19T11:57:22.686151723Z I0319 11:57:22.686130 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... 2026-03-19T11:57:22.704408685Z I0319 11:57:22.704340 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-19T11:57:22.704408685Z I0319 11:57:22.704398 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-19T11:57:22.704491848Z I0319 11:57:22.704462 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:57:22.704491848Z I0319 11:57:22.704483 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:57:22.704525750Z I0319 11:57:22.704498 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:57:22.704525750Z I0319 11:57:22.704516 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:57:22.704744265Z I0319 11:57:22.704662 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-19T11:57:22.705380062Z I0319 11:57:22.705150 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-19T11:57:22.705380062Z I0319 11:57:22.705168 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-19T11:57:22.805513715Z I0319 11:57:22.805439 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:57:22.805550006Z I0319 11:57:22.805510 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-19T11:57:22.805758362Z I0319 11:57:22.805624 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-scheduler-operator-container_previous.log0000640000000000000000000004303515156762350043172 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-dddff6458-4wj9n2026-03-19T11:54:01.489979643Z I0319 11:54:01.489900 1 request.go:700] Waited for 1.194689921s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa 2026-03-19T11:54:01.700365324Z I0319 11:54:01.700299 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"d873ad09-db29-404a-a863-01d698721dc4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing 2026-03-19T11:54:02.691853867Z I0319 11:54:02.691794 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Pending phase 2026-03-19T11:54:04.693009460Z I0319 11:54:04.692810 1 request.go:700] Waited for 1.000382543s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-3-master-0 2026-03-19T11:54:04.697903410Z I0319 11:54:04.697836 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-03-19T11:54:06.290147891Z I0319 11:54:06.290073 1 request.go:700] Waited for 1.078171802s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa 2026-03-19T11:54:06.496580222Z I0319 11:54:06.496506 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-03-19T11:54:07.895686529Z I0319 11:54:07.895597 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-03-19T11:54:41.072213075Z I0319 11:54:41.072124 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="c8eafabc280e7f9ab877829aeb0e1733df2210c963e9f89d7f9e19907c1168f8") 2026-03-19T11:54:41.072408789Z W0319 11:54:41.072335 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-19T11:54:41.072631714Z I0319 11:54:41.072594 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="15f33802cdb75a6f8478c698ae3ba03dc8f59113efdd2fc3d36b702832c00c92") 2026-03-19T11:54:41.072700156Z I0319 11:54:41.072673 1 base_controller.go:181] Shutting down StatusSyncer_kube-scheduler ... 2026-03-19T11:54:41.072711406Z I0319 11:54:41.072698 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-19T11:54:41.072796748Z I0319 11:54:41.072772 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-19T11:54:41.072881060Z I0319 11:54:41.072844 1 base_controller.go:181] Shutting down cluster-kube-scheduler-operator-UnsupportedConfigOverrides ... 2026-03-19T11:54:41.072890740Z I0319 11:54:41.072884 1 base_controller.go:181] Shutting down kube-scheduler-Node ... 2026-03-19T11:54:41.072907910Z I0319 11:54:41.072895 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-19T11:54:41.072915580Z I0319 11:54:41.072908 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-19T11:54:41.072925441Z I0319 11:54:41.072919 1 base_controller.go:181] Shutting down kube-controller-manager-RemoveStaleConditions ... 2026-03-19T11:54:41.073130805Z I0319 11:54:41.073097 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-19T11:54:41.074363223Z I0319 11:54:41.074322 1 base_controller.go:181] Shutting down Installer ... 2026-03-19T11:54:41.074490166Z E0319 11:54:41.074432 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: Get \"https://172.30.0.1:443/apis/operator.openshift.io/v1/kubeschedulers/cluster\": context canceled" 2026-03-19T11:54:41.074498486Z I0319 11:54:41.074490 1 base_controller.go:181] Shutting down kube-scheduler-StaticPodState ... 2026-03-19T11:54:41.077873172Z I0319 11:54:41.077828 1 base_controller.go:123] Shutting down worker of cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller ... 2026-03-19T11:54:41.077873172Z I0319 11:54:41.077858 1 base_controller.go:113] All cluster-kube-scheduler-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-19T11:54:41.077890153Z I0319 11:54:41.077854 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-19T11:54:41.077927364Z I0319 11:54:41.077898 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-19T11:54:41.077927364Z I0319 11:54:41.077869 1 controller_manager.go:54] cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller terminated 2026-03-19T11:54:41.077937124Z I0319 11:54:41.077929 1 base_controller.go:123] Shutting down worker of kube-scheduler-Node controller ... 2026-03-19T11:54:41.077945284Z I0319 11:54:41.077938 1 base_controller.go:113] All kube-scheduler-Node workers have been terminated 2026-03-19T11:54:41.077953554Z I0319 11:54:41.077947 1 controller_manager.go:54] kube-scheduler-Node controller terminated 2026-03-19T11:54:41.077962284Z I0319 11:54:41.077957 1 base_controller.go:123] Shutting down worker of kube-controller-manager-RemoveStaleConditions controller ... 2026-03-19T11:54:41.077970544Z I0319 11:54:41.077966 1 base_controller.go:113] All kube-controller-manager-RemoveStaleConditions workers have been terminated 2026-03-19T11:54:41.077994425Z I0319 11:54:41.077955 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-19T11:54:41.078024016Z I0319 11:54:41.077998 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-19T11:54:41.078024016Z I0319 11:54:41.078014 1 base_controller.go:181] Shutting down kube-scheduler-InstallerState ... 2026-03-19T11:54:41.078031336Z I0319 11:54:41.078013 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:54:41.078040566Z I0319 11:54:41.078034 1 base_controller.go:181] Shutting down GuardController ... 2026-03-19T11:54:41.078062626Z I0319 11:54:41.078046 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-19T11:54:41.078070577Z I0319 11:54:41.078056 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:54:41.078070577Z I0319 11:54:41.078063 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-19T11:54:41.078202229Z I0319 11:54:41.078002 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-19T11:54:41.078210240Z I0319 11:54:41.078193 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-19T11:54:41.078216980Z I0319 11:54:41.078019 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-19T11:54:41.078216980Z I0319 11:54:41.078204 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-189763466/tls.crt::/tmp/serving-cert-189763466/tls.key" 2026-03-19T11:54:41.078249081Z I0319 11:54:41.078230 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-19T11:54:41.078256081Z I0319 11:54:41.078249 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-19T11:54:41.078284121Z I0319 11:54:41.078259 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-19T11:54:41.078284121Z I0319 11:54:41.078274 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-19T11:54:41.078324692Z I0319 11:54:41.078299 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-19T11:54:41.078324692Z I0319 11:54:41.078304 1 base_controller.go:159] All StatusSyncer_kube-scheduler post start hooks have been terminated 2026-03-19T11:54:41.078324692Z I0319 11:54:41.078320 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-19T11:54:41.078335892Z I0319 11:54:41.078324 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-19T11:54:41.078344223Z I0319 11:54:41.078339 1 base_controller.go:181] Shutting down kube-scheduler ... 2026-03-19T11:54:41.078352143Z I0319 11:54:41.078263 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-19T11:54:41.078359163Z I0319 11:54:41.078350 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-19T11:54:41.078359163Z I0319 11:54:41.078356 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-19T11:54:41.078367643Z I0319 11:54:41.078363 1 controller_manager.go:54] RevisionController controller terminated 2026-03-19T11:54:41.078374253Z I0319 11:54:41.078356 1 controller_manager.go:54] GuardController controller terminated 2026-03-19T11:54:41.078380913Z I0319 11:54:41.078376 1 base_controller.go:123] Shutting down worker of kube-scheduler controller ... 2026-03-19T11:54:41.078387544Z I0319 11:54:41.078382 1 base_controller.go:113] All kube-scheduler workers have been terminated 2026-03-19T11:54:41.078409354Z I0319 11:54:41.078388 1 base_controller.go:181] Shutting down PruneController ... 2026-03-19T11:54:41.078409354Z E0319 11:54:41.078344 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": context canceled" 2026-03-19T11:54:41.078419264Z E0319 11:54:41.072697 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-03-19T11:54:41.078425924Z I0319 11:54:41.078419 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-19T11:54:41.078434175Z I0319 11:54:41.078428 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-19T11:54:41.078444555Z I0319 11:54:41.078429 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-19T11:54:41.078444555Z I0319 11:54:41.078439 1 controller_manager.go:54] PruneController controller terminated 2026-03-19T11:54:41.078451485Z I0319 11:54:41.078444 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-19T11:54:41.078458115Z I0319 11:54:41.078453 1 builder.go:335] server exited 2026-03-19T11:54:41.078488196Z I0319 11:54:41.078474 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-19T11:54:41.078495166Z I0319 11:54:41.078488 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-19T11:54:41.078501816Z I0319 11:54:41.078493 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-19T11:54:41.078571858Z E0319 11:54:41.078537 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock: client rate limiter Wait returned an error: context canceled 2026-03-19T11:54:41.078571858Z E0319 11:54:41.078545 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-19T11:54:41.078579968Z I0319 11:54:41.078567 1 leaderelection.go:297] failed to renew lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock: timed out waiting for the condition 2026-03-19T11:54:41.078579968Z I0319 11:54:41.078414 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-scheduler controller ... 2026-03-19T11:54:41.078588568Z I0319 11:54:41.078583 1 base_controller.go:113] All StatusSyncer_kube-scheduler workers have been terminated 2026-03-19T11:54:41.078635499Z I0319 11:54:41.078620 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-19T11:54:41.078635499Z I0319 11:54:41.078633 1 base_controller.go:113] All Installer workers have been terminated 2026-03-19T11:54:41.078644659Z I0319 11:54:41.078639 1 controller_manager.go:54] Installer controller terminated 2026-03-19T11:54:41.079287204Z E0319 11:54:41.079236 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-19T11:54:41.079577110Z E0319 11:54:41.079522 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:54:41.079591461Z I0319 11:54:41.079571 1 base_controller.go:123] Shutting down worker of kube-scheduler-InstallerState controller ... 2026-03-19T11:54:41.079591461Z I0319 11:54:41.079582 1 base_controller.go:113] All kube-scheduler-InstallerState workers have been terminated 2026-03-19T11:54:41.079603481Z I0319 11:54:41.079596 1 controller_manager.go:54] kube-scheduler-InstallerState controller terminated 2026-03-19T11:54:41.079639732Z I0319 11:54:41.079616 1 base_controller.go:123] Shutting down worker of kube-scheduler-StaticPodState controller ... 2026-03-19T11:54:41.079639732Z I0319 11:54:41.079630 1 base_controller.go:113] All kube-scheduler-StaticPodState workers have been terminated 2026-03-19T11:54:41.079639732Z I0319 11:54:41.079635 1 controller_manager.go:54] kube-scheduler-StaticPodState controller terminated 2026-03-19T11:54:41.080635945Z E0319 11:54:41.080590 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-scheduler/scheduler-clusterrolebinding.yaml\" (string): Get \"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:operator:kube-scheduler:public-2\": context canceled, \"assets/kube-scheduler/policyconfigmap-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/policyconfigmap-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:54:41.080658205Z I0319 11:54:41.080632 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-19T11:54:41.080658205Z I0319 11:54:41.080645 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-19T11:54:41.080667045Z I0319 11:54:41.080657 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-19T11:54:41.080700206Z I0319 11:54:41.080677 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-19T11:54:41.080700206Z I0319 11:54:41.080695 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-19T11:54:41.082083447Z I0319 11:54:41.082042 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-19T11:54:41.082083447Z I0319 11:54:41.082063 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-19T11:54:46.072281795Z I0319 11:54:46.072177 1 observer_polling.go:162] Shutting down file observer 2026-03-19T11:55:15.082371464Z E0319 11:55:15.082291 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-19T11:55:15.082371464Z W0319 11:55:15.082331 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-4wj9n.json0000640000000000000000000001365315156762350032031 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-dddff6458-4wj9n","generateName":"openshift-kube-scheduler-operator-dddff6458-","namespace":"openshift-kube-scheduler-operator","uid":"9b61ea14-a7ea-49f3-9df4-5655765ddf7c","resourceVersion":"9206","creationTimestamp":"2026-03-19T11:51:32Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"dddff6458"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.25/23\"],\"mac_address\":\"0a:58:0a:80:00:19\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.25/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.25\"\n ],\n \"mac\": \"0a:58:0a:80:00:19\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-dddff6458","uid":"4d26c94e-717d-44b3-b3ed-298d9194dd84","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:49Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:12Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:12Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:49Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.25","podIPs":[{"ip":"10.128.0.25"}],"startTime":"2026-03-19T11:52:49Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-03-19T11:55:54Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-19T11:53:15Z","finishedAt":"2026-03-19T11:55:15Z","containerID":"cri-o://a63fe33504bcc71f9b4e0c9d251065dc432b3176905c1514b755fad213c3ed25"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","containerID":"cri-o://6ed27e0d6c4ae09582d5a0f02eeacd245422eb62b0fb54b563d1fef122917d0c","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-3-master-0/installer_current.log0000640000000000000000000001513615156762350027177 0ustar00000000000000002026-03-19T11:54:03.767379529Z I0319 11:54:03.767096 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc000643180 cert-secrets:0xc000642f00 configmaps:0xc000642aa0 namespace:0xc0006428c0 optional-configmaps:0xc000642be0 optional-secrets:0xc000642b40 pod:0xc000642960 pod-manifest-dir:0xc000642d20 resource-dir:0xc000642c80 revision:0xc000642820 secrets:0xc000642a00 v:0xc000643e00] [0xc000643e00 0xc000642820 0xc0006428c0 0xc000642960 0xc000642c80 0xc000642d20 0xc000642aa0 0xc000642be0 0xc000642b40 0xc000642a00 0xc000643180 0xc000642f00] [] map[cert-configmaps:0xc000642fa0 cert-dir:0xc000643180 cert-secrets:0xc000642f00 configmaps:0xc000642aa0 help:0xc0004d2a00 kubeconfig:0xc000642780 log-flush-frequency:0xc000643d60 namespace:0xc0006428c0 optional-cert-configmaps:0xc0006430e0 optional-cert-secrets:0xc000643040 optional-configmaps:0xc000642be0 optional-secrets:0xc000642b40 pod:0xc000642960 pod-manifest-dir:0xc000642d20 pod-manifests-lock-file:0xc000642e60 resource-dir:0xc000642c80 revision:0xc000642820 secrets:0xc000642a00 timeout-duration:0xc000642dc0 v:0xc000643e00 vmodule:0xc000643ea0] [0xc000642780 0xc000642820 0xc0006428c0 0xc000642960 0xc000642a00 0xc000642aa0 0xc000642b40 0xc000642be0 0xc000642c80 0xc000642d20 0xc000642dc0 0xc000642e60 0xc000642f00 0xc000642fa0 0xc000643040 0xc0006430e0 0xc000643180 0xc000643d60 0xc000643e00 0xc000643ea0 0xc0004d2a00] [0xc000642fa0 0xc000643180 0xc000642f00 0xc000642aa0 0xc0004d2a00 0xc000642780 0xc000643d60 0xc0006428c0 0xc0006430e0 0xc000643040 0xc000642be0 0xc000642b40 0xc000642960 0xc000642d20 0xc000642e60 0xc000642c80 0xc000642820 0xc000642a00 0xc000642dc0 0xc000643e00 0xc000643ea0] map[104:0xc0004d2a00 118:0xc000643e00] [] -1 0 0xc00077e960 true 0x223dac0 []} 2026-03-19T11:54:03.767545352Z I0319 11:54:03.767376 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000653380)({ 2026-03-19T11:54:03.767545352Z KubeConfig: (string) "", 2026-03-19T11:54:03.767545352Z KubeClient: (kubernetes.Interface) , 2026-03-19T11:54:03.767545352Z Revision: (string) (len=1) "3", 2026-03-19T11:54:03.767545352Z NodeName: (string) "", 2026-03-19T11:54:03.767545352Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-03-19T11:54:03.767545352Z Clock: (clock.RealClock) { 2026-03-19T11:54:03.767545352Z }, 2026-03-19T11:54:03.767545352Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-03-19T11:54:03.767545352Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-19T11:54:03.767545352Z (string) (len=31) "localhost-recovery-client-token" 2026-03-19T11:54:03.767545352Z }, 2026-03-19T11:54:03.767545352Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-19T11:54:03.767545352Z (string) (len=12) "serving-cert" 2026-03-19T11:54:03.767545352Z }, 2026-03-19T11:54:03.767545352Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-03-19T11:54:03.767545352Z (string) (len=18) "kube-scheduler-pod", 2026-03-19T11:54:03.767545352Z (string) (len=6) "config", 2026-03-19T11:54:03.767545352Z (string) (len=17) "serviceaccount-ca", 2026-03-19T11:54:03.767545352Z (string) (len=20) "scheduler-kubeconfig", 2026-03-19T11:54:03.767545352Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-03-19T11:54:03.767545352Z }, 2026-03-19T11:54:03.767545352Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-19T11:54:03.767545352Z (string) (len=16) "policy-configmap" 2026-03-19T11:54:03.767545352Z }, 2026-03-19T11:54:03.767545352Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-03-19T11:54:03.767545352Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-03-19T11:54:03.767545352Z }, 2026-03-19T11:54:03.767545352Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-19T11:54:03.767545352Z CertConfigMapNamePrefixes: ([]string) , 2026-03-19T11:54:03.767545352Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-03-19T11:54:03.767545352Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-03-19T11:54:03.767545352Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-19T11:54:03.767545352Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-19T11:54:03.767545352Z Timeout: (time.Duration) 2m0s, 2026-03-19T11:54:03.767545352Z StaticPodManifestsLockFile: (string) "", 2026-03-19T11:54:03.767545352Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-19T11:54:03.767545352Z KubeletVersion: (string) "" 2026-03-19T11:54:03.767545352Z }) 2026-03-19T11:54:03.843411588Z I0319 11:54:03.842189 1 cmd.go:413] Getting controller reference for node master-0 2026-03-19T11:54:03.860151084Z I0319 11:54:03.859985 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-19T11:54:03.860151084Z I0319 11:54:03.860077 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-19T11:54:03.860151084Z I0319 11:54:03.860089 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-19T11:54:03.863594382Z I0319 11:54:03.863546 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-03-19T11:54:13.874029986Z I0319 11:54:13.871772 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-03-19T11:54:37.868691688Z W0319 11:54:37.868579 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:54:57.865495092Z W0319 11:54:57.865299 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:55:17.868400248Z W0319 11:55:17.868302 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:55:31.871675407Z W0319 11:55:31.871470 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:55:31.871675407Z F0319 11:55:31.871521 1 cmd.go:109] timed out waiting for the condition config/pod/openshift-kube-scheduler/installer-3-master-0.json0000640000000000000000000001632515156762350022665 0ustar0000000000000000{"metadata":{"name":"installer-3-master-0","namespace":"openshift-kube-scheduler","uid":"870e66ff-82ed-4c91-8197-dddcb78048c2","resourceVersion":"9221","creationTimestamp":"2026-03-19T11:54:01Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.48/23\"],\"mac_address\":\"0a:58:0a:80:00:30\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.48/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.48\"\n ],\n \"mac\": \"0a:58:0a:80:00:30\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-3","uid":"886e2f06-3983-4b61-b41a-e59506adde95"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=3","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:55:54Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:01Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:55:53Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:55:53Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:01Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.48","podIPs":[{"ip":"10.128.0.48"}],"startTime":"2026-03-19T11:54:01Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0319 11:54:03.842189 1 cmd.go:413] Getting controller reference for node master-0\nI0319 11:54:03.859985 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0319 11:54:03.860077 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0319 11:54:03.860089 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0319 11:54:03.863546 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nI0319 11:54:13.871772 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nW0319 11:54:37.868579 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0319 11:54:57.865299 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0319 11:55:17.868302 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0319 11:55:31.871470 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0319 11:55:31.871521 1 cmd.go:109] timed out waiting for the condition\n","startedAt":"2026-03-19T11:54:03Z","finishedAt":"2026-03-19T11:55:31Z","containerID":"cri-o://42a335ff2e41047c0beba4d30a5bd16330153a9f1ce92821358c191efd6f3fc9"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","containerID":"cri-o://42a335ff2e41047c0beba4d30a5bd16330153a9f1ce92821358c191efd6f3fc9","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000005013115156762350030227 0ustar00000000000000002026-03-19T11:55:31.559284654Z weight: 2 2026-03-19T11:55:31.559284654Z - name: InterPodAffinity 2026-03-19T11:55:31.559284654Z weight: 2 2026-03-19T11:55:31.559284654Z - name: DefaultPreemption 2026-03-19T11:55:31.559284654Z weight: 0 2026-03-19T11:55:31.559284654Z - name: NodeResourcesBalancedAllocation 2026-03-19T11:55:31.559284654Z weight: 1 2026-03-19T11:55:31.559284654Z - name: ImageLocality 2026-03-19T11:55:31.559284654Z weight: 1 2026-03-19T11:55:31.559284654Z - name: DefaultBinder 2026-03-19T11:55:31.559284654Z weight: 0 2026-03-19T11:55:31.559284654Z permit: {} 2026-03-19T11:55:31.559284654Z postBind: {} 2026-03-19T11:55:31.559284654Z postFilter: {} 2026-03-19T11:55:31.559284654Z preBind: {} 2026-03-19T11:55:31.559284654Z preEnqueue: {} 2026-03-19T11:55:31.559284654Z preFilter: {} 2026-03-19T11:55:31.559284654Z preScore: {} 2026-03-19T11:55:31.559284654Z queueSort: {} 2026-03-19T11:55:31.559284654Z reserve: {} 2026-03-19T11:55:31.559284654Z score: {} 2026-03-19T11:55:31.559284654Z schedulerName: default-scheduler 2026-03-19T11:55:31.559284654Z > 2026-03-19T11:55:31.560675188Z I0319 11:55:31.560621 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-03-19T11:55:31.560675188Z I0319 11:55:31.560643 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-03-19T11:55:31.562606736Z I0319 11:55:31.562546 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:55:31.562669727Z I0319 11:55:31.562632 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:55:31.562936474Z I0319 11:55:31.562865 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773921271\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773921271\" (2026-03-19 10:54:31 +0000 UTC to 2027-03-19 10:54:31 +0000 UTC (now=2026-03-19 11:55:31.562831051 +0000 UTC))" 2026-03-19T11:55:31.562965604Z I0319 11:55:31.562926 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2026-03-19T11:55:31.563111588Z I0319 11:55:31.563041 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773921271\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773921271\" (2026-03-19 10:54:31 +0000 UTC to 2029-03-19 10:54:31 +0000 UTC (now=2026-03-19 11:55:31.563015095 +0000 UTC))" 2026-03-19T11:55:31.563111588Z I0319 11:55:31.563103 1 secure_serving.go:213] Serving securely on [::]:10259 2026-03-19T11:55:31.563189340Z I0319 11:55:31.563166 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-19T11:55:31.566993412Z I0319 11:55:31.565266 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-19T11:55:31.567400152Z I0319 11:55:31.567366 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:55:31.568630142Z I0319 11:55:31.568542 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:55:31.568630142Z I0319 11:55:31.568607 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:55:31.568851787Z I0319 11:55:31.568755 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:55:31.568898948Z I0319 11:55:31.568878 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:55:31.569062792Z I0319 11:55:31.569020 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:55:31.569062792Z I0319 11:55:31.569051 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-19T11:55:31.569332999Z I0319 11:55:31.569264 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:55:31.569332999Z I0319 11:55:31.569312 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:55:31.569408550Z I0319 11:55:31.569383 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:55:31.569474652Z I0319 11:55:31.569437 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:55:31.569644767Z I0319 11:55:31.569604 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:55:31.579463036Z I0319 11:55:31.579353 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:55:31.579717612Z I0319 11:55:31.579632 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:55:31.586631000Z I0319 11:55:31.586536 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:55:31.597774602Z I0319 11:55:31.597664 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:55:31.663800418Z I0319 11:55:31.663628 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:55:31.663800418Z I0319 11:55:31.663667 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-03-19T11:55:31.664193188Z I0319 11:55:31.664117 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-19 11:36:25 +0000 UTC to 2036-03-16 11:36:25 +0000 UTC (now=2026-03-19 11:55:31.664094585 +0000 UTC))" 2026-03-19T11:55:31.664193188Z I0319 11:55:31.664157 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-19 11:43:03 +0000 UTC to 2026-03-20 11:43:03 +0000 UTC (now=2026-03-19 11:55:31.664152787 +0000 UTC))" 2026-03-19T11:55:31.664193188Z I0319 11:55:31.664176 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-19 11:43:03 +0000 UTC to 2027-03-19 11:43:03 +0000 UTC (now=2026-03-19 11:55:31.664170237 +0000 UTC))" 2026-03-19T11:55:31.664213248Z I0319 11:55:31.664190 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-19 11:43:04 +0000 UTC to 2027-03-19 11:43:04 +0000 UTC (now=2026-03-19 11:55:31.664184677 +0000 UTC))" 2026-03-19T11:55:31.664226688Z I0319 11:55:31.664205 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-19 11:43:00 +0000 UTC to 2036-03-16 11:43:00 +0000 UTC (now=2026-03-19 11:55:31.664199898 +0000 UTC))" 2026-03-19T11:55:31.664443023Z I0319 11:55:31.664388 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773921271\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773921271\" (2026-03-19 10:54:31 +0000 UTC to 2027-03-19 10:54:31 +0000 UTC (now=2026-03-19 11:55:31.664378642 +0000 UTC))" 2026-03-19T11:55:31.664533196Z I0319 11:55:31.664486 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773921271\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773921271\" (2026-03-19 10:54:31 +0000 UTC to 2029-03-19 10:54:31 +0000 UTC (now=2026-03-19 11:55:31.664479374 +0000 UTC))" 2026-03-19T11:55:36.665214734Z E0319 11:55:36.665111 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:55:45.282200847Z E0319 11:55:45.282062 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:55:53.259796190Z E0319 11:55:53.259680 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:56:02.397586986Z E0319 11:56:02.397446 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:56:09.706784016Z E0319 11:56:09.705996 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:56:17.633153115Z E0319 11:56:17.633017 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:56:25.509377115Z E0319 11:56:25.509255 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:56:32.754452740Z E0319 11:56:32.754337 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:56:40.039008866Z E0319 11:56:40.038666 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:56:48.615689402Z E0319 11:56:48.615564 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:56:55.942133620Z E0319 11:56:55.942039 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:57:04.097070912Z E0319 11:57:04.096966 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:57:11.390943789Z E0319 11:57:11.390801 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:57:20.120787635Z E0319 11:57:20.120665 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:57:38.185472199Z I0319 11:57:38.185357 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-03-19T11:57:38.186426302Z I0319 11:57:38.186337 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-7dcf5569b5-kpmgt" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:57:38.186796481Z I0319 11:57:38.186682 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594-89rdt" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:57:38.187389386Z I0319 11:57:38.187328 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-b4bf74f6-llsdf" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:57:38.197045539Z I0319 11:57:38.196574 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-h668l" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:38.197045539Z I0319 11:57:38.196930 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-ccbc5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:38.202375179Z I0319 11:57:38.200700 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-gwt6h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:38.669081302Z I0319 11:57:38.666548 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-w2fqh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:50.553630669Z I0319 11:57:50.553243 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-6cb57bb5db-9fbqc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:50.588367233Z I0319 11:57:50.588291 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78-ssxxd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:50.653141075Z I0319 11:57:50.651067 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c-wr65t" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:50.654849466Z I0319 11:57:50.654804 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-6f69995874-942g6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:50.655101052Z I0319 11:57:50.655073 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-7d87854d6-htdhf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:50.655493912Z I0319 11:57:50.655339 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-84d549f6d5-66wvv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:50.689160660Z I0319 11:57:50.687059 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77-mhvls" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:50.720102151Z I0319 11:57:50.720020 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-866dc4744-dnx7f" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:50.729784206Z I0319 11:57:50.726149 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-6fbb6cf6f9-jf7p6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:50.769761767Z I0319 11:57:50.769667 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-68bf6ff9d6-djfg8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:50.865080741Z I0319 11:57:50.862833 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-bbf67c86c-n58nq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:59.222616215Z I0319 11:57:59.222540 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-daemon-mgzld" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:58:15.259787063Z I0319 11:58:15.259564 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-5c6485487f-5zvc5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:58:16.300961265Z I0319 11:58:16.299537 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856-87z86" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:58:17.857979352Z I0319 11:58:17.857686 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-controller-b4f87c5b9-lg6h9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:58:19.063222768Z I0319 11:58:19.062771 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594-89rdt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:58:19.067502451Z I0319 11:58:19.067412 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-source-b4bf74f6-llsdf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:58:19.079027691Z I0319 11:58:19.072983 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress/router-default-7dcf5569b5-kpmgt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:58:22.319879355Z I0319 11:58:22.316775 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-server-ltk8s" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:58:24.040824522Z I0319 11:58:24.040702 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-6c8df6d4b-xfwkr" node="master-0" evaluatedNodes=1 feasibleNodes=1 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006733415156762350030436 0ustar00000000000000002026-03-19T11:51:30.704467427Z I0319 11:51:30.704336 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/olm-operator-5c9796789-l9sw9" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:30.805135607Z I0319 11:51:30.805038 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-n5gr9" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:30.904957778Z I0319 11:51:30.904848 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-jq5vq" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:31.029547374Z I0319 11:51:31.029220 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-olm-operator/cluster-olm-operator-67dcd4998-rgbzk" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:31.102085692Z I0319 11:51:31.102014 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-authentication-operator/authentication-operator-5885bfd7f4-gqd94" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:31.201377171Z I0319 11:51:31.201251 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5f5d689c6b-fx8ng" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:31.301770965Z I0319 11:51:31.301476 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-598fbc5f8f-kb5vd" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:31.402908774Z I0319 11:51:31.402827 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-6ghdm" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:31.502429728Z I0319 11:51:31.502259 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-6hsqn" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:31.601920732Z I0319 11:51:31.601847 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-etcd-operator/etcd-operator-8544cbcf9c-9w7hc" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:31.709284501Z I0319 11:51:31.709153 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-56d8475767-pk574" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:51:31.802054743Z I0319 11:51:31.801929 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-dns-operator/dns-operator-9c5679d8f-965np" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:31.903202283Z I0319 11:51:31.903100 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress-operator/ingress-operator-66b84d69b-qrjj4" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:32.005504759Z I0319 11:51:32.005443 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-5gvgh" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:32.111772405Z I0319 11:51:32.111677 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-image-registry/cluster-image-registry-operator-5549dc66cb-nrtp2" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:32.204127308Z I0319 11:51:32.203986 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-ng9ss" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:32.301323890Z I0319 11:51:32.301211 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-4wj9n" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:32.404054346Z I0319 11:51:32.403913 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-6bb5bfb6fd-7g57w" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:32.503887036Z I0319 11:51:32.503791 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-marketplace/marketplace-operator-89ccd998f-bftt4" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:32.609968797Z I0319 11:51:32.609884 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/network-operator-7bd846bfc4-7fz6w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:51:32.701599913Z I0319 11:51:32.701486 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-pjc7h" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:32.803073011Z I0319 11:51:32.803005 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/cluster-monitoring-operator-58845fbb57-tkcwh" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:34.661642047Z I0319 11:51:34.661467 1 schedule_one.go:314] "Successfully bound pod to node" pod="assisted-installer/assisted-installer-controller-48bcp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:51:42.437697183Z I0319 11:51:42.437559 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/mtu-prober-vjwlk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:51:52.303410833Z I0319 11:51:52.303327 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-552pc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:51:52.504283692Z I0319 11:51:52.504198 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-additional-cni-plugins-n8vwk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:51:53.292607087Z I0319 11:51:53.292534 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/network-metrics-daemon-f6wv7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:51:55.386852192Z I0319 11:51:55.386787 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-multus/multus-admission-controller-5dbbb8b86f-wdwkz" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:52:04.718554018Z I0319 11:52:04.718007 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-57f769d897-zs6dd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:04.905963519Z I0319 11:52:04.905650 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-m724d" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:06.886375649Z I0319 11:52:06.886316 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-b4bf74f6-llsdf" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:52:07.888443963Z I0319 11:52:07.888375 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-cr8n7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:12.291109421Z I0319 11:52:12.290981 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-j528w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:36.250104075Z I0319 11:52:36.249484 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-4qxkd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.814096328Z I0319 11:52:49.813906 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-b865698dc-md7m5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.832338311Z I0319 11:52:49.832177 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-8544cbcf9c-9w7hc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.832338311Z I0319 11:52:49.832266 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-66b84d69b-qrjj4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.832768122Z I0319 11:52:49.832265 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-9c5679d8f-965np" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.832768122Z I0319 11:52:49.832371 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-ng9ss" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.832768122Z I0319 11:52:49.832746 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-pjc7h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.833863286Z I0319 11:52:49.832970 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-598fbc5f8f-kb5vd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.833863286Z I0319 11:52:49.832983 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-89ccd998f-bftt4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.833863286Z I0319 11:52:49.833028 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-n5gr9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.833863286Z I0319 11:52:49.833085 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-5gvgh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.833863286Z I0319 11:52:49.833103 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-jq5vq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.833863286Z I0319 11:52:49.833175 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-5885bfd7f4-gqd94" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.833863286Z I0319 11:52:49.833206 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-67dcd4998-rgbzk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.833863286Z I0319 11:52:49.833211 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-5549dc66cb-nrtp2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.833863286Z I0319 11:52:49.833267 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-6bb5bfb6fd-7g57w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.833863286Z I0319 11:52:49.833306 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5f5d689c6b-fx8ng" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.833863286Z I0319 11:52:49.833378 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-58845fbb57-tkcwh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.833863286Z I0319 11:52:49.833368 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-6ghdm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.833863286Z I0319 11:52:49.833488 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-5dbbb8b86f-wdwkz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.833863286Z I0319 11:52:49.833595 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-5c9796789-l9sw9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.833863286Z I0319 11:52:49.833621 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-4wj9n" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.833863286Z I0319 11:52:49.833716 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-6hsqn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:49.866914074Z I0319 11:52:49.866189 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-n52gc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:06.324132531Z I0319 11:53:06.322595 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-64854d9cff-764k4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:13.790618523Z I0319 11:53:13.790479 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-8487694857-jls48" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:18.930720593Z I0319 11:53:18.930530 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-79bc6b8d76-lzfbh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:22.428135048Z I0319 11:53:22.428068 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-f5df8899c-f4z5p" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:23.261829043Z I0319 11:53:23.261750 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-564c64dc4c-zm89v" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:23.285970575Z I0319 11:53:23.285903 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-7d8dbf5ffc-9kt5l" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:53:25.053213631Z I0319 11:53:25.052512 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-6d4875b77f-58xfr" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:53:25.075220345Z I0319 11:53:25.075045 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-9f85cf6f7-6kjz2" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:53:27.472302571Z I0319 11:53:27.472240 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6d4875b77f-58xfr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:27.472673440Z I0319 11:53:27.472652 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-9f85cf6f7-6kjz2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:29.312076496Z I0319 11:53:29.311977 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-5848f5856-st8kj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:30.783359537Z I0319 11:53:30.783267 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-5547669f67-9ltgx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:32.392106788Z I0319 11:53:32.389920 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-57777556ff-mjwfm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:32.491161365Z I0319 11:53:32.490505 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-6864dc98f7-xzxpq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:36.470154079Z I0319 11:53:36.469688 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-f67f6868b-chx8j" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:53:37.539460200Z I0319 11:53:37.539056 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-f67f6868b-chx8j" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.623407478Z I0319 11:53:37.623357 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-oauth-apiserver/apiserver-899bc59d8-xxr9r" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:53:42.242109935Z I0319 11:53:42.242059 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-654cf7f8-7lm6v" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:53:42.271443625Z I0319 11:53:42.271350 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-f6c859bf8-g2lgv" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:53:42.532266799Z I0319 11:53:42.531296 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-x6mmm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:43.153325203Z I0319 11:53:43.150473 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-ztgjs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:43.584842485Z I0319 11:53:43.584668 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-pm77f" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:44.390998680Z I0319 11:53:44.388989 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-7dcf5569b5-kpmgt" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:53:44.482628720Z I0319 11:53:44.479920 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-oauth-apiserver/apiserver-899bc59d8-xxr9r" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:53:44.482628720Z I0319 11:53:44.480247 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-f6c859bf8-g2lgv" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:53:44.492794199Z I0319 11:53:44.489166 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-654cf7f8-7lm6v" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:47.000928722Z I0319 11:53:47.000857 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-oauth-apiserver/apiserver-899bc59d8-xxr9r" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:53:47.009125436Z I0319 11:53:47.008852 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-f6c859bf8-g2lgv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:52.579806668Z I0319 11:53:52.569648 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-899bc59d8-xxr9r" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:59.568389569Z I0319 11:53:59.568312 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-7d58488df-rcbf8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:01.871334048Z I0319 11:54:01.871278 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-548bb99f44-txbjj" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:54:01.975824257Z I0319 11:54:01.973547 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-864f875b6b-rcjvd" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:54:03.020263700Z I0319 11:54:03.019374 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-548bb99f44-txbjj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:03.022073272Z I0319 11:54:03.022036 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-864f875b6b-rcjvd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:07.962385049Z I0319 11:54:07.962324 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594-89rdt" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:54:13.551626167Z I0319 11:54:13.551506 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-6f97756bc8-j7rc9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:13.880257736Z I0319 11:54:13.877850 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-rrvxk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:14.076817275Z I0319 11:54:14.075177 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-pn57d" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:20.024484643Z E0319 11:54:20.024332 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path 2026-03-19T11:54:25.024435191Z E0319 11:54:25.024351 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-03-19T11:54:25.024435191Z I0319 11:54:25.024394 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2026-03-19T11:54:30.025395732Z E0319 11:54:30.025321 1 leaderelection.go:322] Failed to release lock: the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io kube-scheduler) 2026-03-19T11:54:30.025395732Z E0319 11:54:30.025365 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515156762350023016 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"0bd9f597-2384-49a3-a928-15186ab72145","resourceVersion":"9160","creationTimestamp":"2026-03-19T11:52:11Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"c83737980b9ee109184b1d78e942cf36","kubernetes.io/config.mirror":"c83737980b9ee109184b1d78e942cf36","kubernetes.io/config.seen":"2026-03-19T11:50:55.505811588Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"41b47749-a7d7-429f-9c0a-3925a76dc079","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:32Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:32Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-19T11:52:56Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-03-19T11:54:31Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-03-19T11:51:06Z","finishedAt":"2026-03-19T11:54:30Z","containerID":"cri-o://901ed10fec5e9417fcd7522a27f15f9a949e9c0dd2ab8e429fd9b30afd0247bf"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","containerID":"cri-o://a24c957c2955f33fcac616e1dace18be5248f20b6e9d2c791c70c17f3df96825","started":true}],"qosClass":"Burstable"}}cluster-policy-controller_current.log0000640000000000000000000012057715156762350034236 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-19T11:51:21.663782939Z E0319 11:51:21.663653 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-19T11:51:33.481099829Z W0319 11:51:33.480990 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-19T11:51:33.481099829Z E0319 11:51:33.481070 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-19T11:51:46.375814686Z W0319 11:51:46.375673 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-19T11:51:46.375814686Z E0319 11:51:46.375789 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-19T11:51:49.537142354Z I0319 11:51:49.537075 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-multus namespace 2026-03-19T11:51:50.468520539Z I0319 11:51:50.468451 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-03-19T11:51:50.671489475Z I0319 11:51:50.671377 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-03-19T11:51:56.314082073Z I0319 11:51:56.314013 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ovn-kubernetes namespace 2026-03-19T11:52:04.307248829Z I0319 11:52:04.307156 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-host-network namespace 2026-03-19T11:52:05.476238490Z I0319 11:52:05.476168 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-diagnostics namespace 2026-03-19T11:52:10.653789726Z E0319 11:52:10.650627 1 leaderelection.go:429] Failed to update lock optimitically: Operation cannot be fulfilled on leases.coordination.k8s.io "cluster-policy-controller-lock": StorageError: invalid object, Code: 4, Key: /kubernetes.io/leases/kube-system/cluster-policy-controller-lock, ResourceVersion: 0, AdditionalErrorMsg: Precondition failed: UID in precondition: 158d5afa-2e00-4525-b538-d30a1dbac75e, UID in object meta: , falling back to slow path 2026-03-19T11:52:11.492247664Z I0319 11:52:11.492168 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-node-identity namespace 2026-03-19T11:52:12.107994440Z I0319 11:52:12.107844 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "network-node-identity" not found 2026-03-19T11:52:12.147286272Z I0319 11:52:12.147232 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "network-node-identity-leases" not found 2026-03-19T11:52:18.408515279Z I0319 11:52:18.408457 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [k8s.cni.cncf.io/v1, Resource=network-attachment-definitions k8s.cni.cncf.io/v1alpha1, Resource=ipamclaims k8s.ovn.org/v1, Resource=egressfirewalls k8s.ovn.org/v1, Resource=egressqoses k8s.ovn.org/v1, Resource=egressservices k8s.ovn.org/v1, Resource=userdefinednetworks whereabouts.cni.cncf.io/v1alpha1, Resource=ippools whereabouts.cni.cncf.io/v1alpha1, Resource=nodeslicepools whereabouts.cni.cncf.io/v1alpha1, Resource=overlappingrangeipreservations], removed: [] 2026-03-19T11:52:18.408594290Z I0319 11:52:18.408570 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressfirewalls.k8s.ovn.org" 2026-03-19T11:52:18.408657522Z I0319 11:52:18.408611 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="network-attachment-definitions.k8s.cni.cncf.io" 2026-03-19T11:52:18.408665232Z I0319 11:52:18.408656 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ippools.whereabouts.cni.cncf.io" 2026-03-19T11:52:18.408712263Z I0319 11:52:18.408695 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ipamclaims.k8s.cni.cncf.io" 2026-03-19T11:52:18.408771924Z I0319 11:52:18.408750 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="nodeslicepools.whereabouts.cni.cncf.io" 2026-03-19T11:52:18.408785195Z I0319 11:52:18.408777 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="userdefinednetworks.k8s.ovn.org" 2026-03-19T11:52:18.408815375Z I0319 11:52:18.408799 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressqoses.k8s.ovn.org" 2026-03-19T11:52:18.408849166Z I0319 11:52:18.408833 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="overlappingrangeipreservations.whereabouts.cni.cncf.io" 2026-03-19T11:52:18.408872687Z I0319 11:52:18.408856 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressservices.k8s.ovn.org" 2026-03-19T11:52:18.410164567Z I0319 11:52:18.410117 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:52:18.410243858Z I0319 11:52:18.410209 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:52:18.410570706Z I0319 11:52:18.410521 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:52:18.411187851Z I0319 11:52:18.410747 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:52:18.571883712Z I0319 11:52:18.571163 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:52:18.571883712Z I0319 11:52:18.571528 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:52:18.571883712Z I0319 11:52:18.571684 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:52:18.571883712Z I0319 11:52:18.571846 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:52:18.572440594Z I0319 11:52:18.572014 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:52:18.609924515Z I0319 11:52:18.609872 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-19T11:52:35.308363841Z W0319 11:52:35.308307 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-19T11:52:35.308468103Z E0319 11:52:35.308454 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-19T11:53:12.933540823Z I0319 11:53:12.933471 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-oauth-apiserver namespace 2026-03-19T11:53:13.739771839Z I0319 11:53:13.739319 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-kube-storage-version-migrator namespace 2026-03-19T11:53:15.928958271Z I0319 11:53:15.928024 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-authentication namespace 2026-03-19T11:53:17.257045911Z I0319 11:53:17.256634 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-service-ca namespace 2026-03-19T11:53:18.631115646Z I0319 11:53:18.631021 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [snapshot.storage.k8s.io/v1, Resource=volumesnapshots], removed: [] 2026-03-19T11:53:18.631251509Z I0319 11:53:18.631210 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="volumesnapshots.snapshot.storage.k8s.io" 2026-03-19T11:53:18.633003628Z I0319 11:53:18.632944 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:53:18.732252200Z I0319 11:53:18.732183 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-19T11:53:21.529862351Z I0319 11:53:21.527796 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-catalogd namespace 2026-03-19T11:53:21.561621136Z I0319 11:53:21.561551 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-operator-controller namespace 2026-03-19T11:53:21.636759465Z I0319 11:53:21.636674 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-controller-manager namespace 2026-03-19T11:53:21.821407836Z I0319 11:53:21.820995 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-route-controller-manager namespace 2026-03-19T11:53:22.054278573Z I0319 11:53:22.054190 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-apiserver namespace 2026-03-19T11:53:23.325424203Z I0319 11:53:23.325350 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:openshift:useroauthaccesstoken-manager" not found 2026-03-19T11:53:25.167310035Z I0319 11:53:25.167239 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:53:28.422793762Z W0319 11:53:28.418967 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-19T11:53:28.422793762Z E0319 11:53:28.419020 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-19T11:53:42.936402776Z I0319 11:53:42.933202 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-dns namespace 2026-03-19T11:53:44.293880267Z I0319 11:53:44.293619 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ingress namespace 2026-03-19T11:53:52.620779729Z I0319 11:53:52.619863 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-03-19T11:53:56.413168556Z I0319 11:53:56.413089 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift namespace 2026-03-19T11:53:56.448310276Z I0319 11:53:56.448125 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-node namespace 2026-03-19T11:53:57.187810074Z I0319 11:53:57.187750 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-03-19T11:54:07.633000163Z I0319 11:54:07.629626 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-fbsqq" has been approved 2026-03-19T11:54:07.672183884Z I0319 11:54:07.672075 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-t74rl" has been approved 2026-03-19T11:54:09.342837267Z W0319 11:54:09.342770 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-19T11:54:09.342837267Z E0319 11:54:09.342827 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-19T11:54:18.746235293Z I0319 11:54:18.745953 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-19T11:54:18.746343755Z E0319 11:54:18.746330 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-19T11:54:48.755678098Z I0319 11:54:48.755566 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-19T11:54:48.755678098Z E0319 11:54:48.755656 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-19T11:54:49.293869509Z W0319 11:54:49.293796 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-19T11:54:49.293869509Z E0319 11:54:49.293846 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-19T11:55:18.765209602Z I0319 11:55:18.765106 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-19T11:55:18.765209602Z E0319 11:55:18.765201 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-19T11:55:34.821713700Z W0319 11:55:34.821613 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-19T11:55:34.821713700Z E0319 11:55:34.821699 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-19T11:55:46.269021203Z E0319 11:55:46.268931 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-19T11:55:48.781110697Z I0319 11:55:48.780926 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-19T11:55:48.781192889Z E0319 11:55:48.781101 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-19T11:56:11.814768798Z W0319 11:56:11.814664 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-19T11:56:11.814768798Z E0319 11:56:11.814720 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-19T11:56:18.790380237Z I0319 11:56:18.790284 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-19T11:56:18.790380237Z E0319 11:56:18.790362 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-19T11:56:46.271549933Z E0319 11:56:46.271455 1 leaderelection.go:436] error retrieving resource lock kube-system/cluster-policy-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-policy-controller-lock) 2026-03-19T11:56:48.799288097Z I0319 11:56:48.799154 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-19T11:56:48.799288097Z E0319 11:56:48.799256 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-19T11:57:09.603469288Z W0319 11:57:09.603386 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-19T11:57:09.603469288Z E0319 11:57:09.603444 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-19T11:57:18.808647551Z I0319 11:57:18.808537 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-19T11:57:18.808647551Z E0319 11:57:18.808629 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-19T11:57:40.404207844Z I0319 11:57:40.402629 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s" not found 2026-03-19T11:57:40.404207844Z I0319 11:57:40.402901 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "openshift-marketplace-metrics" not found 2026-03-19T11:57:40.502705535Z I0319 11:57:40.502612 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-cluster-autoscaler-operator" not found 2026-03-19T11:57:40.604619820Z I0319 11:57:40.604518 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-03-19T11:57:41.123901929Z I0319 11:57:41.123837 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-03-19T11:57:41.149808278Z I0319 11:57:41.149694 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-machine-api-operator" not found 2026-03-19T11:57:48.816713063Z I0319 11:57:48.816600 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-19T11:57:48.816713063Z E0319 11:57:48.816681 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-19T11:57:58.037782895Z W0319 11:57:58.034470 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-19T11:57:58.037782895Z E0319 11:57:58.034517 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-19T11:58:18.826011487Z I0319 11:58:18.825912 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-19T11:58:18.826158291Z E0319 11:58:18.826139 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" kube-controller-manager_current.log0000640000000000000000000006316015156762350033610 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-19T11:57:55.047152209Z I0319 11:57:55.046786 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-6fbb6cf6f9" duration="90.722µs" 2026-03-19T11:57:55.049219100Z I0319 11:57:55.049164 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-bbf67c86c" duration="72.182µs" 2026-03-19T11:57:55.249623936Z I0319 11:57:55.249548 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77" duration="56.322µs" 2026-03-19T11:57:55.318780935Z I0319 11:57:55.318118 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-68bf6ff9d6" duration="59.091µs" 2026-03-19T11:57:55.328142413Z I0319 11:57:55.328073 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-84d549f6d5" duration="55.352µs" 2026-03-19T11:57:55.328860259Z I0319 11:57:55.328216 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-866dc4744" duration="34.701µs" 2026-03-19T11:57:55.328860259Z I0319 11:57:55.328312 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78" duration="30.74µs" 2026-03-19T11:57:55.813237181Z I0319 11:57:55.812317 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-bbf67c86c" duration="75.253µs" 2026-03-19T11:57:55.937606481Z I0319 11:57:55.936481 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-84d549f6d5" duration="17.380042ms" 2026-03-19T11:57:55.937606481Z I0319 11:57:55.936580 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-84d549f6d5" duration="62.722µs" 2026-03-19T11:57:55.961607904Z I0319 11:57:55.961552 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-6f69995874" duration="56.611µs" 2026-03-19T11:57:56.002283541Z I0319 11:57:55.996996 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-866dc4744" duration="3.263649ms" 2026-03-19T11:57:56.192639603Z I0319 11:57:56.192504 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-68bf6ff9d6" duration="79.952µs" 2026-03-19T11:57:56.426994725Z I0319 11:57:56.426915 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-7d87854d6" duration="63.331µs" 2026-03-19T11:57:56.452136925Z I0319 11:57:56.452058 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77" duration="57.171µs" 2026-03-19T11:57:56.474136899Z I0319 11:57:56.474073 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78" duration="49.891µs" 2026-03-19T11:57:56.495784065Z I0319 11:57:56.495131 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-6fbb6cf6f9" duration="68.241µs" 2026-03-19T11:57:56.913584929Z I0319 11:57:56.912172 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-bbf67c86c" duration="17.136856ms" 2026-03-19T11:57:56.913584929Z I0319 11:57:56.912329 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-bbf67c86c" duration="90.152µs" 2026-03-19T11:58:01.458799672Z I0319 11:58:01.458450 1 replica_set.go:624] "Too many replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" need=0 deleting=1 2026-03-19T11:58:01.458799672Z I0319 11:58:01.458488 1 replica_set.go:251] "Found related ReplicaSets" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" relatedReplicaSets=["openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c"] 2026-03-19T11:58:01.458799672Z I0319 11:58:01.458522 1 controller_utils.go:608] "Deleting pod" logger="replicaset-controller" controller="cluster-cloud-controller-manager-operator-7559f7c68c" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c-wr65t" 2026-03-19T11:58:01.501783946Z I0319 11:58:01.501694 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="43.282961ms" 2026-03-19T11:58:01.523350850Z I0319 11:58:01.523278 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="21.387219ms" 2026-03-19T11:58:01.523605637Z I0319 11:58:01.523564 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="106.203µs" 2026-03-19T11:58:14.046101523Z I0319 11:58:14.046016 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-68bf6ff9d6" duration="23.609693ms" 2026-03-19T11:58:14.046101523Z I0319 11:58:14.046086 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-68bf6ff9d6" duration="32.921µs" 2026-03-19T11:58:14.075876626Z I0319 11:58:14.075779 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-866dc4744" duration="12.468493ms" 2026-03-19T11:58:14.080793545Z I0319 11:58:14.076848 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-866dc4744" duration="29.461µs" 2026-03-19T11:58:14.088221575Z I0319 11:58:14.088125 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-6cb57bb5db" duration="57.272µs" 2026-03-19T11:58:14.142563675Z I0319 11:58:14.142480 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-7d87854d6" duration="15.665281ms" 2026-03-19T11:58:14.145382893Z I0319 11:58:14.142784 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-7d87854d6" duration="91.922µs" 2026-03-19T11:58:14.270438201Z I0319 11:58:14.270357 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77" duration="16.796968ms" 2026-03-19T11:58:14.270531363Z I0319 11:58:14.270503 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77" duration="92.132µs" 2026-03-19T11:58:14.318312923Z I0319 11:58:14.318218 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-6f69995874" duration="16.92515ms" 2026-03-19T11:58:14.318981179Z I0319 11:58:14.318771 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-6f69995874" duration="102.692µs" 2026-03-19T11:58:14.335223963Z I0319 11:58:14.335135 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-6cb57bb5db" duration="68.251µs" 2026-03-19T11:58:15.200649727Z I0319 11:58:15.199429 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78" duration="18.048298ms" 2026-03-19T11:58:15.200694428Z I0319 11:58:15.200657 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78" duration="33.37µs" 2026-03-19T11:58:15.219352291Z I0319 11:58:15.218558 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-6cb57bb5db" duration="35.661µs" 2026-03-19T11:58:15.227856888Z I0319 11:58:15.227453 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-6cb57bb5db" duration="34.831µs" 2026-03-19T11:58:15.241301264Z I0319 11:58:15.241211 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-cluster-machine-approver/machine-approver-5c6485487f" need=1 creating=1 2026-03-19T11:58:15.246151952Z I0319 11:58:15.246081 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="77.542µs" 2026-03-19T11:58:15.262695144Z I0319 11:58:15.262618 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="21.43849ms" 2026-03-19T11:58:15.263020712Z I0319 11:58:15.262982 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cluster-machine-approver/machine-approver" err="Operation cannot be fulfilled on deployments.apps \"machine-approver\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-19T11:58:15.293845951Z I0319 11:58:15.291979 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-6fbb6cf6f9" duration="19.715938ms" 2026-03-19T11:58:15.293845951Z I0319 11:58:15.292132 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-6fbb6cf6f9" duration="97.002µs" 2026-03-19T11:58:15.298807581Z I0319 11:58:15.296131 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="33.458962ms" 2026-03-19T11:58:15.298807581Z I0319 11:58:15.296267 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="82.572µs" 2026-03-19T11:58:15.298807581Z I0319 11:58:15.296302 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="19.971µs" 2026-03-19T11:58:15.343185059Z I0319 11:58:15.343099 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="51.091µs" 2026-03-19T11:58:15.406788343Z I0319 11:58:15.406250 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="57.552µs" 2026-03-19T11:58:16.246504143Z I0319 11:58:16.246428 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="45.952µs" 2026-03-19T11:58:16.256670489Z I0319 11:58:16.256615 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="70.032µs" 2026-03-19T11:58:16.277592207Z I0319 11:58:16.277369 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" need=1 creating=1 2026-03-19T11:58:16.294048717Z I0319 11:58:16.293102 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="15.965367ms" 2026-03-19T11:58:16.294048717Z I0319 11:58:16.293228 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="81.162µs" 2026-03-19T11:58:16.305034134Z I0319 11:58:16.304677 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="27.336823ms" 2026-03-19T11:58:16.306134741Z I0319 11:58:16.306081 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-19T11:58:16.314987346Z I0319 11:58:16.314374 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="9.623463ms" 2026-03-19T11:58:16.314987346Z I0319 11:58:16.314439 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="32.551µs" 2026-03-19T11:58:16.333943825Z I0319 11:58:16.333842 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="67.012µs" 2026-03-19T11:58:17.840396795Z I0319 11:58:17.840288 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" need=1 creating=1 2026-03-19T11:58:17.850293015Z I0319 11:58:17.850207 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-machine-config-operator/machine-config-controller" err="Operation cannot be fulfilled on deployments.apps \"machine-config-controller\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-19T11:58:17.863892365Z I0319 11:58:17.862016 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="21.773749ms" 2026-03-19T11:58:17.873701024Z I0319 11:58:17.872990 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="10.918745ms" 2026-03-19T11:58:17.895409981Z I0319 11:58:17.895329 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="22.261711ms" 2026-03-19T11:58:17.895493383Z I0319 11:58:17.895463 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="81.902µs" 2026-03-19T11:58:17.895688808Z I0319 11:58:17.895643 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="127.113µs" 2026-03-19T11:58:18.296879099Z I0319 11:58:18.294175 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="15.779233ms" 2026-03-19T11:58:18.296879099Z I0319 11:58:18.294263 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="50.871µs" 2026-03-19T11:58:18.635406239Z I0319 11:58:18.635218 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="69.521µs" 2026-03-19T11:58:19.062855398Z I0319 11:58:19.062771 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="94.993µs" 2026-03-19T11:58:19.068845744Z I0319 11:58:19.068783 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="88.112µs" 2026-03-19T11:58:19.069263964Z I0319 11:58:19.069241 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7dcf5569b5" duration="48.881µs" 2026-03-19T11:58:19.084836752Z I0319 11:58:19.084087 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="62.412µs" 2026-03-19T11:58:19.090526320Z I0319 11:58:19.090446 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="120.763µs" 2026-03-19T11:58:19.199529917Z I0319 11:58:19.199432 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="99.572µs" 2026-03-19T11:58:19.378809970Z I0319 11:58:19.378754 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7dcf5569b5" duration="89.162µs" 2026-03-19T11:58:19.399147265Z I0319 11:58:19.399080 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="46.981µs" 2026-03-19T11:58:19.430444864Z I0319 11:58:19.429119 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="12.698019ms" 2026-03-19T11:58:19.430444864Z I0319 11:58:19.429242 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="67.002µs" 2026-03-19T11:58:19.892537275Z I0319 11:58:19.890516 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="69.673µs" 2026-03-19T11:58:19.998249571Z I0319 11:58:19.997366 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="55.751µs" 2026-03-19T11:58:20.334849495Z I0319 11:58:20.334760 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="11.029108ms" 2026-03-19T11:58:20.334909396Z I0319 11:58:20.334842 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="31.291µs" 2026-03-19T11:58:20.549542138Z I0319 11:58:20.549441 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2026-03-19T11:58:20.582817246Z E0319 11:58:20.582227 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" logger="UnhandledError" 2026-03-19T11:58:23.362796908Z I0319 11:58:23.361008 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7dcf5569b5" duration="108.182µs" 2026-03-19T11:58:23.406631563Z I0319 11:58:23.405624 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="9.917541ms" 2026-03-19T11:58:23.406631563Z I0319 11:58:23.405981 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="65.651µs" 2026-03-19T11:58:24.015881656Z I0319 11:58:24.014771 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/prometheus-operator-6c8df6d4b" need=1 creating=1 2026-03-19T11:58:24.031425614Z I0319 11:58:24.031335 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/prometheus-operator" err="Operation cannot be fulfilled on deployments.apps \"prometheus-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-19T11:58:24.037017029Z I0319 11:58:24.036942 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="22.23371ms" 2026-03-19T11:58:24.049512953Z I0319 11:58:24.049392 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/prometheus-operator" err="Operation cannot be fulfilled on deployments.apps \"prometheus-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-19T11:58:24.062319334Z I0319 11:58:24.061932 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="24.944076ms" 2026-03-19T11:58:24.062319334Z I0319 11:58:24.062045 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="55.591µs" 2026-03-19T11:58:24.090436766Z I0319 11:58:24.090372 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="114.672µs" 2026-03-19T11:58:25.372246251Z I0319 11:58:25.372179 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="74.391µs" 2026-03-19T11:58:25.893164830Z I0319 11:58:25.893067 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="69.002µs" kube-controller-manager_previous.log0000640000000000000000000003173215156762350034002 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-19T11:55:54.338148813Z I0319 11:55:54.338093 1 flags.go:64] FLAG: --requestheader-allowed-names="[]" 2026-03-19T11:55:54.338148813Z I0319 11:55:54.338097 1 flags.go:64] FLAG: --requestheader-client-ca-file="" 2026-03-19T11:55:54.338148813Z I0319 11:55:54.338110 1 flags.go:64] FLAG: --requestheader-extra-headers-prefix="[x-remote-extra-]" 2026-03-19T11:55:54.338148813Z I0319 11:55:54.338115 1 flags.go:64] FLAG: --requestheader-group-headers="[x-remote-group]" 2026-03-19T11:55:54.338148813Z I0319 11:55:54.338122 1 flags.go:64] FLAG: --requestheader-username-headers="[x-remote-user]" 2026-03-19T11:55:54.338148813Z I0319 11:55:54.338127 1 flags.go:64] FLAG: --resource-quota-sync-period="5m0s" 2026-03-19T11:55:54.338148813Z I0319 11:55:54.338130 1 flags.go:64] FLAG: --root-ca-file="/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt" 2026-03-19T11:55:54.338148813Z I0319 11:55:54.338134 1 flags.go:64] FLAG: --route-reconciliation-period="10s" 2026-03-19T11:55:54.338148813Z I0319 11:55:54.338137 1 flags.go:64] FLAG: --secondary-node-eviction-rate="0.01" 2026-03-19T11:55:54.338148813Z I0319 11:55:54.338140 1 flags.go:64] FLAG: --secure-port="10257" 2026-03-19T11:55:54.338148813Z I0319 11:55:54.338143 1 flags.go:64] FLAG: --service-account-private-key-file="/etc/kubernetes/secrets/service-account.key" 2026-03-19T11:55:54.338180403Z I0319 11:55:54.338146 1 flags.go:64] FLAG: --service-cluster-ip-range="172.30.0.0/16" 2026-03-19T11:55:54.338180403Z I0319 11:55:54.338150 1 flags.go:64] FLAG: --show-hidden-metrics-for-version="" 2026-03-19T11:55:54.338180403Z I0319 11:55:54.338153 1 flags.go:64] FLAG: --terminated-pod-gc-threshold="12500" 2026-03-19T11:55:54.338180403Z I0319 11:55:54.338156 1 flags.go:64] FLAG: --tls-cert-file="" 2026-03-19T11:55:54.338180403Z I0319 11:55:54.338159 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2026-03-19T11:55:54.338180403Z I0319 11:55:54.338163 1 flags.go:64] FLAG: --tls-min-version="" 2026-03-19T11:55:54.338180403Z I0319 11:55:54.338166 1 flags.go:64] FLAG: --tls-private-key-file="" 2026-03-19T11:55:54.338180403Z I0319 11:55:54.338169 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2026-03-19T11:55:54.338180403Z I0319 11:55:54.338173 1 flags.go:64] FLAG: --unhealthy-zone-threshold="0.55" 2026-03-19T11:55:54.338180403Z I0319 11:55:54.338176 1 flags.go:64] FLAG: --unsupported-kube-api-over-localhost="false" 2026-03-19T11:55:54.338191994Z I0319 11:55:54.338179 1 flags.go:64] FLAG: --use-service-account-credentials="true" 2026-03-19T11:55:54.338191994Z I0319 11:55:54.338182 1 flags.go:64] FLAG: --v="2" 2026-03-19T11:55:54.338199574Z I0319 11:55:54.338189 1 flags.go:64] FLAG: --version="false" 2026-03-19T11:55:54.338199574Z I0319 11:55:54.338194 1 flags.go:64] FLAG: --vmodule="" 2026-03-19T11:55:54.338363688Z W0319 11:55:54.338337 1 feature_gate.go:330] unrecognized feature gate: RouteAdvertisements 2026-03-19T11:55:54.338363688Z W0319 11:55:54.338347 1 feature_gate.go:330] unrecognized feature gate: ImageStreamImportMode 2026-03-19T11:55:54.338363688Z W0319 11:55:54.338351 1 feature_gate.go:330] unrecognized feature gate: Example 2026-03-19T11:55:54.338363688Z W0319 11:55:54.338354 1 feature_gate.go:330] unrecognized feature gate: NewOLM 2026-03-19T11:55:54.338363688Z W0319 11:55:54.338356 1 feature_gate.go:330] unrecognized feature gate: NetworkDiagnosticsConfig 2026-03-19T11:55:54.338363688Z W0319 11:55:54.338360 1 feature_gate.go:330] unrecognized feature gate: ConsolePluginContentSecurityPolicy 2026-03-19T11:55:54.338384958Z W0319 11:55:54.338362 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAzure 2026-03-19T11:55:54.338384958Z W0319 11:55:54.338365 1 feature_gate.go:330] unrecognized feature gate: NutanixMultiSubnets 2026-03-19T11:55:54.338384958Z W0319 11:55:54.338368 1 feature_gate.go:330] unrecognized feature gate: MachineAPIOperatorDisableMachineHealthCheckController 2026-03-19T11:55:54.338384958Z W0319 11:55:54.338371 1 feature_gate.go:330] unrecognized feature gate: DNSNameResolver 2026-03-19T11:55:54.338384958Z W0319 11:55:54.338374 1 feature_gate.go:330] unrecognized feature gate: BuildCSIVolumes 2026-03-19T11:55:54.338384958Z W0319 11:55:54.338377 1 feature_gate.go:330] unrecognized feature gate: VSphereStaticIPs 2026-03-19T11:55:54.338384958Z W0319 11:55:54.338380 1 feature_gate.go:330] unrecognized feature gate: InsightsOnDemandDataGather 2026-03-19T11:55:54.338384958Z W0319 11:55:54.338382 1 feature_gate.go:330] unrecognized feature gate: PersistentIPsForVirtualization 2026-03-19T11:55:54.338395299Z W0319 11:55:54.338385 1 feature_gate.go:330] unrecognized feature gate: NetworkSegmentation 2026-03-19T11:55:54.338395299Z W0319 11:55:54.338390 1 feature_gate.go:330] unrecognized feature gate: MixedCPUsAllocation 2026-03-19T11:55:54.338395299Z W0319 11:55:54.338392 1 feature_gate.go:330] unrecognized feature gate: SigstoreImageVerification 2026-03-19T11:55:54.338403999Z W0319 11:55:54.338396 1 feature_gate.go:353] Setting GA feature gate DisableKubeletCloudCredentialProviders=true. It will be removed in a future release. 2026-03-19T11:55:54.338403999Z W0319 11:55:54.338400 1 feature_gate.go:330] unrecognized feature gate: InsightsConfigAPI 2026-03-19T11:55:54.338411859Z W0319 11:55:54.338404 1 feature_gate.go:330] unrecognized feature gate: SignatureStores 2026-03-19T11:55:54.338411859Z W0319 11:55:54.338407 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiNetworks 2026-03-19T11:55:54.338419499Z W0319 11:55:54.338409 1 feature_gate.go:330] unrecognized feature gate: EtcdBackendQuota 2026-03-19T11:55:54.338419499Z W0319 11:55:54.338414 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImages 2026-03-19T11:55:54.338419499Z W0319 11:55:54.338416 1 feature_gate.go:330] unrecognized feature gate: AdditionalRoutingCapabilities 2026-03-19T11:55:54.338427339Z W0319 11:55:54.338419 1 feature_gate.go:330] unrecognized feature gate: CSIDriverSharedResource 2026-03-19T11:55:54.338427339Z W0319 11:55:54.338423 1 feature_gate.go:330] unrecognized feature gate: HardwareSpeed 2026-03-19T11:55:54.338434909Z W0319 11:55:54.338426 1 feature_gate.go:330] unrecognized feature gate: InsightsConfig 2026-03-19T11:55:54.338434909Z W0319 11:55:54.338429 1 feature_gate.go:330] unrecognized feature gate: VolumeGroupSnapshot 2026-03-19T11:55:54.338434909Z W0319 11:55:54.338431 1 feature_gate.go:330] unrecognized feature gate: VSphereDriverConfiguration 2026-03-19T11:55:54.338442960Z W0319 11:55:54.338434 1 feature_gate.go:330] unrecognized feature gate: VSphereControlPlaneMachineSet 2026-03-19T11:55:54.338442960Z W0319 11:55:54.338437 1 feature_gate.go:330] unrecognized feature gate: AlibabaPlatform 2026-03-19T11:55:54.338442960Z W0319 11:55:54.338439 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDCWithUIDAndExtraClaimMappings 2026-03-19T11:55:54.338454570Z W0319 11:55:54.338442 1 feature_gate.go:330] unrecognized feature gate: IngressControllerLBSubnetsAWS 2026-03-19T11:55:54.338454570Z W0319 11:55:54.338445 1 feature_gate.go:330] unrecognized feature gate: AzureWorkloadIdentity 2026-03-19T11:55:54.338454570Z W0319 11:55:54.338448 1 feature_gate.go:330] unrecognized feature gate: InsightsRuntimeExtractor 2026-03-19T11:55:54.338454570Z W0319 11:55:54.338451 1 feature_gate.go:330] unrecognized feature gate: MinimumKubeletVersion 2026-03-19T11:55:54.338462750Z W0319 11:55:54.338455 1 feature_gate.go:330] unrecognized feature gate: GCPClusterHostedDNS 2026-03-19T11:55:54.338462750Z W0319 11:55:54.338459 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiVCenters 2026-03-19T11:55:54.338470100Z W0319 11:55:54.338461 1 feature_gate.go:330] unrecognized feature gate: PinnedImages 2026-03-19T11:55:54.338470100Z W0319 11:55:54.338466 1 feature_gate.go:353] Setting GA feature gate CloudDualStackNodeIPs=true. It will be removed in a future release. 2026-03-19T11:55:54.338477710Z W0319 11:55:54.338469 1 feature_gate.go:330] unrecognized feature gate: GCPLabelsTags 2026-03-19T11:55:54.338477710Z W0319 11:55:54.338472 1 feature_gate.go:330] unrecognized feature gate: BareMetalLoadBalancer 2026-03-19T11:55:54.338477710Z W0319 11:55:54.338475 1 feature_gate.go:330] unrecognized feature gate: GatewayAPI 2026-03-19T11:55:54.338485841Z W0319 11:55:54.338478 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstall 2026-03-19T11:55:54.338485841Z W0319 11:55:54.338480 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstallIBMCloud 2026-03-19T11:55:54.338485841Z W0319 11:55:54.338483 1 feature_gate.go:330] unrecognized feature gate: AWSClusterHostedDNS 2026-03-19T11:55:54.338493981Z W0319 11:55:54.338485 1 feature_gate.go:330] unrecognized feature gate: ChunkSizeMiB 2026-03-19T11:55:54.338493981Z W0319 11:55:54.338488 1 feature_gate.go:330] unrecognized feature gate: AWSEFSDriverVolumeMetrics 2026-03-19T11:55:54.338493981Z W0319 11:55:54.338490 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDC 2026-03-19T11:55:54.338501621Z W0319 11:55:54.338493 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImagesAWS 2026-03-19T11:55:54.338501621Z W0319 11:55:54.338496 1 feature_gate.go:330] unrecognized feature gate: AdminNetworkPolicy 2026-03-19T11:55:54.338509241Z W0319 11:55:54.338500 1 feature_gate.go:330] unrecognized feature gate: OnClusterBuild 2026-03-19T11:55:54.338509241Z W0319 11:55:54.338503 1 feature_gate.go:330] unrecognized feature gate: MachineConfigNodes 2026-03-19T11:55:54.338509241Z W0319 11:55:54.338506 1 feature_gate.go:330] unrecognized feature gate: MachineAPIMigration 2026-03-19T11:55:54.338517131Z W0319 11:55:54.338508 1 feature_gate.go:330] unrecognized feature gate: OVNObservability 2026-03-19T11:55:54.338517131Z W0319 11:55:54.338511 1 feature_gate.go:330] unrecognized feature gate: OpenShiftPodSecurityAdmission 2026-03-19T11:55:54.338517131Z W0319 11:55:54.338514 1 feature_gate.go:330] unrecognized feature gate: PlatformOperators 2026-03-19T11:55:54.338524802Z W0319 11:55:54.338517 1 feature_gate.go:330] unrecognized feature gate: IngressControllerDynamicConfigurationManager 2026-03-19T11:55:54.338524802Z W0319 11:55:54.338520 1 feature_gate.go:330] unrecognized feature gate: AutomatedEtcdBackup 2026-03-19T11:55:54.338536072Z W0319 11:55:54.338523 1 feature_gate.go:351] Setting deprecated feature gate KMSv1=true. It will be removed in a future release. 2026-03-19T11:55:54.338536072Z W0319 11:55:54.338527 1 feature_gate.go:330] unrecognized feature gate: NodeDisruptionPolicy 2026-03-19T11:55:54.338536072Z W0319 11:55:54.338531 1 feature_gate.go:353] Setting GA feature gate ValidatingAdmissionPolicy=true. It will be removed in a future release. 2026-03-19T11:55:54.338543922Z W0319 11:55:54.338534 1 feature_gate.go:330] unrecognized feature gate: MachineAPIProviderOpenStack 2026-03-19T11:55:54.338543922Z W0319 11:55:54.338537 1 feature_gate.go:330] unrecognized feature gate: SetEIPForNLBIngressController 2026-03-19T11:55:54.338543922Z W0319 11:55:54.338541 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallGCP 2026-03-19T11:55:54.338551882Z W0319 11:55:54.338543 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAWS 2026-03-19T11:55:54.338551882Z W0319 11:55:54.338547 1 feature_gate.go:330] unrecognized feature gate: BootcNodeManagement 2026-03-19T11:55:54.338559242Z W0319 11:55:54.338550 1 feature_gate.go:330] unrecognized feature gate: NetworkLiveMigration 2026-03-19T11:55:54.338559242Z W0319 11:55:54.338553 1 feature_gate.go:330] unrecognized feature gate: PrivateHostedZoneAWS 2026-03-19T11:55:54.338559242Z W0319 11:55:54.338556 1 feature_gate.go:330] unrecognized feature gate: UpgradeStatus 2026-03-19T11:55:54.338566863Z W0319 11:55:54.338559 1 feature_gate.go:330] unrecognized feature gate: MetricsCollectionProfiles 2026-03-19T11:55:54.338566863Z W0319 11:55:54.338562 1 feature_gate.go:330] unrecognized feature gate: ClusterMonitoringConfig 2026-03-19T11:55:54.658021208Z I0319 11:55:54.657929 1 serving.go:380] Generated self-signed cert (/var/run/kubernetes/kube-controller-manager.crt, /var/run/kubernetes/kube-controller-manager.key) 2026-03-19T11:55:54.659790600Z I0319 11:55:54.659747 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/kubernetes/kube-controller-manager.crt::/var/run/kubernetes/kube-controller-manager.key" 2026-03-19T11:56:55.109863189Z E0319 11:56:55.109759 1 run.go:72] "command failed" err="unable to load configmap based request-header-client-ca-file: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps extension-apiserver-authentication)" config/pod/kube-system/bootstrap-kube-controller-manager-master-0.json0000640000000000000000000002734715156762350024641 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-controller-manager-master-0","namespace":"kube-system","uid":"6125acf0-c600-44c7-a816-38c41fcfebee","resourceVersion":"9540","creationTimestamp":"2026-03-19T11:52:29Z","labels":{"openshift.io/component":"controller-manager","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"46f265536aba6292ead501bc9b49f327","kubernetes.io/config.mirror":"46f265536aba6292ead501bc9b49f327","kubernetes.io/config.seen":"2026-03-19T11:50:55.505810568Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"41b47749-a7d7-429f-9c0a-3925a76dc079","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"etc-kubernetes-cloud","hostPath":{"path":"/etc/kubernetes/cloud","type":""}},{"name":"config","hostPath":{"path":"/etc/kubernetes/bootstrap-configs","type":""}},{"name":"ssl-certs-host","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["hyperkube","kube-controller-manager"],"args":["--openshift-config=/etc/kubernetes/config/kube-controller-manager-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2","--allocate-node-cidrs=false","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--cert-dir=/var/run/kubernetes","--cloud-provider=external","--cluster-cidr=10.128.0.0/16","--cluster-signing-cert-file=/etc/kubernetes/secrets/kubelet-signer.crt","--cluster-signing-duration=720h","--cluster-signing-key-file=/etc/kubernetes/secrets/kubelet-signer.key","--controllers=*","--controllers=-bootstrapsigner","--controllers=-tokencleaner","--controllers=-ttl","--enable-dynamic-provisioning=true","--feature-gates=AWSClusterHostedDNS=false","--feature-gates=AWSEFSDriverVolumeMetrics=true","--feature-gates=AdditionalRoutingCapabilities=false","--feature-gates=AdminNetworkPolicy=true","--feature-gates=AlibabaPlatform=true","--feature-gates=AutomatedEtcdBackup=false","--feature-gates=AzureWorkloadIdentity=true","--feature-gates=BareMetalLoadBalancer=true","--feature-gates=BootcNodeManagement=false","--feature-gates=BuildCSIVolumes=true","--feature-gates=CSIDriverSharedResource=false","--feature-gates=ChunkSizeMiB=true","--feature-gates=CloudDualStackNodeIPs=true","--feature-gates=ClusterAPIInstall=false","--feature-gates=ClusterAPIInstallIBMCloud=false","--feature-gates=ClusterMonitoringConfig=false","--feature-gates=ConsolePluginContentSecurityPolicy=false","--feature-gates=DNSNameResolver=false","--feature-gates=DisableKubeletCloudCredentialProviders=true","--feature-gates=DynamicResourceAllocation=false","--feature-gates=EtcdBackendQuota=false","--feature-gates=EventedPLEG=false","--feature-gates=Example=false","--feature-gates=ExternalOIDC=false","--feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false","--feature-gates=GCPClusterHostedDNS=false","--feature-gates=GCPLabelsTags=true","--feature-gates=GatewayAPI=false","--feature-gates=HardwareSpeed=true","--feature-gates=ImageStreamImportMode=false","--feature-gates=IngressControllerDynamicConfigurationManager=false","--feature-gates=IngressControllerLBSubnetsAWS=true","--feature-gates=InsightsConfig=false","--feature-gates=InsightsConfigAPI=false","--feature-gates=InsightsOnDemandDataGather=false","--feature-gates=InsightsRuntimeExtractor=false","--feature-gates=KMSv1=true","--feature-gates=MachineAPIMigration=false","--feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false","--feature-gates=MachineAPIProviderOpenStack=false","--feature-gates=MachineConfigNodes=false","--feature-gates=ManagedBootImages=true","--feature-gates=ManagedBootImagesAWS=true","--feature-gates=MaxUnavailableStatefulSet=false","--feature-gates=MetricsCollectionProfiles=false","--feature-gates=MinimumKubeletVersion=false","--feature-gates=MixedCPUsAllocation=false","--feature-gates=MultiArchInstallAWS=true","--feature-gates=MultiArchInstallAzure=false","--feature-gates=MultiArchInstallGCP=true","--feature-gates=NetworkDiagnosticsConfig=true","--feature-gates=NetworkLiveMigration=true","--feature-gates=NetworkSegmentation=true","--feature-gates=NewOLM=true","--feature-gates=NodeDisruptionPolicy=true","--feature-gates=NodeSwap=false","--feature-gates=NutanixMultiSubnets=false","--feature-gates=OVNObservability=false","--feature-gates=OnClusterBuild=true","--feature-gates=OpenShiftPodSecurityAdmission=false","--feature-gates=PersistentIPsForVirtualization=true","--feature-gates=PinnedImages=false","--feature-gates=PlatformOperators=false","--feature-gates=PrivateHostedZoneAWS=true","--feature-gates=ProcMountType=false","--feature-gates=RouteAdvertisements=false","--feature-gates=RouteExternalCertificate=false","--feature-gates=ServiceAccountTokenNodeBinding=false","--feature-gates=SetEIPForNLBIngressController=true","--feature-gates=SignatureStores=false","--feature-gates=SigstoreImageVerification=false","--feature-gates=StreamingCollectionEncodingToJSON=true","--feature-gates=StreamingCollectionEncodingToProtobuf=true","--feature-gates=TranslateStreamCloseWebsocketRequests=false","--feature-gates=UpgradeStatus=false","--feature-gates=UserNamespacesPodSecurityStandards=false","--feature-gates=UserNamespacesSupport=false","--feature-gates=VSphereControlPlaneMachineSet=true","--feature-gates=VSphereDriverConfiguration=true","--feature-gates=VSphereMultiNetworks=false","--feature-gates=VSphereMultiVCenters=true","--feature-gates=VSphereStaticIPs=true","--feature-gates=ValidatingAdmissionPolicy=true","--feature-gates=VolumeAttributesClass=false","--feature-gates=VolumeGroupSnapshot=false","--flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec","--kube-api-burst=300","--kube-api-qps=150","--leader-elect-renew-deadline=12s","--leader-elect-resource-lock=leases","--leader-elect-retry-period=3s","--leader-elect=true","--pv-recycler-pod-template-filepath-hostpath=","--pv-recycler-pod-template-filepath-nfs=","--root-ca-file=/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt","--secure-port=10257","--service-account-private-key-file=/etc/kubernetes/secrets/service-account.key","--service-cluster-ip-range=172.30.0.0/16","--use-service-account-credentials=true"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","command":["cluster-policy-controller","start"],"args":["--config=/etc/kubernetes/config/cluster-policy-controller-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--namespace=$(POD_NAMESPACE)","--v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-19T11:52:56Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2026-03-19T11:51:09Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","containerID":"cri-o://6ecb192a1cfeb4529102ad33aeed1229502ac0d4a0688a01c8e90bffa6cdc39c","started":true},{"name":"kube-controller-manager","state":{"running":{"startedAt":"2026-03-19T11:57:29Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-03-19T11:55:54Z","finishedAt":"2026-03-19T11:56:55Z","containerID":"cri-o://70e30dd45946084b4dbfa27658bf40bdaa54f00c37bf6e48547b5796a6b773e3"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","containerID":"cri-o://b533d36029413fb01ef12a682704ad486041204246c172de95f0a4aeff2f5180","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000001020415156762350044336 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-ff989d6cc-5gvgh2026-03-19T11:56:28.231510335Z I0319 11:56:28.231307 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-19T11:56:28.231510335Z I0319 11:56:28.231463 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-19T11:56:28.234104075Z I0319 11:56:28.232045 1 observer_polling.go:159] Starting file observer 2026-03-19T11:57:12.719372882Z I0319 11:57:12.718411 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602261953.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-19T11:57:22.645231209Z I0319 11:57:22.645158 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-19T11:57:22.645231209Z W0319 11:57:22.645203 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:57:22.645231209Z W0319 11:57:22.645212 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:57:22.645231209Z W0319 11:57:22.645219 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-19T11:57:22.645296850Z W0319 11:57:22.645227 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-19T11:57:22.645296850Z W0319 11:57:22.645231 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-19T11:57:22.645296850Z W0319 11:57:22.645235 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-19T11:57:22.649475403Z I0319 11:57:22.649419 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-19T11:57:22.656339358Z I0319 11:57:22.656164 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... 2026-03-19T11:57:22.665739952Z I0319 11:57:22.665173 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-19T11:57:22.665739952Z I0319 11:57:22.665285 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-19T11:57:22.665739952Z I0319 11:57:22.665315 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-19T11:57:22.665739952Z I0319 11:57:22.665359 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-19T11:57:22.665739952Z I0319 11:57:22.665549 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-19T11:57:22.666017400Z I0319 11:57:22.665756 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:57:22.666017400Z I0319 11:57:22.665765 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:57:22.666017400Z I0319 11:57:22.665780 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:57:22.666017400Z I0319 11:57:22.665786 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:57:22.768385853Z I0319 11:57:22.767816 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:57:22.768385853Z I0319 11:57:22.767885 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-19T11:57:22.768385853Z I0319 11:57:22.767993 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-controller-manager-operator_previous.log0000640000000000000000000004674715156762350044555 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-ff989d6cc-5gvgh2026-03-19T11:54:42.604949856Z I0319 11:54:42.602698 1 base_controller.go:181] Shutting down kube-controller-manager-operator-UnsupportedConfigOverrides ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.602723 1 base_controller.go:181] Shutting down kube-controller-manager-Node ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.602785 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.602791 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.602807 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.602955 1 base_controller.go:181] Shutting down kube-controller-manager ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603005 1 base_controller.go:181] Shutting down StatusSyncer_kube-controller-manager ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603021 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603030 1 base_controller.go:159] All StatusSyncer_kube-controller-manager post start hooks have been terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603053 1 base_controller.go:181] Shutting down GarbageCollectorWatcherController ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603109 1 base_controller.go:123] Shutting down worker of kube-controller-manager controller ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603117 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-controller-manager controller ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603131 1 base_controller.go:123] Shutting down worker of GarbageCollectorWatcherController controller ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603140 1 base_controller.go:113] All GarbageCollectorWatcherController workers have been terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603205 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603220 1 base_controller.go:181] Shutting down kube-controller-manager-InstallerState ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603222 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603259 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603284 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603304 1 base_controller.go:113] All kube-controller-manager workers have been terminated 2026-03-19T11:54:42.604949856Z E0319 11:54:42.603310 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": context canceled" 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603348 1 base_controller.go:181] Shutting down kube-controller-manager-StaticPodState ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603416 1 base_controller.go:113] All StatusSyncer_kube-controller-manager workers have been terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603543 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603657 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603676 1 base_controller.go:181] Shutting down SATokenSignerController ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.603713 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604020 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604035 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604090 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604135 1 base_controller.go:181] Shutting down PruneController ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604141 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604152 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604160 1 base_controller.go:123] Shutting down worker of kube-controller-manager-operator-UnsupportedConfigOverrides controller ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604168 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604188 1 controller_manager.go:54] PruneController controller terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604187 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604190 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-4080148873/tls.crt::/tmp/serving-cert-4080148873/tls.key" 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604203 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604213 1 base_controller.go:123] Shutting down worker of kube-controller-manager-Node controller ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604204 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604224 1 base_controller.go:113] All kube-controller-manager-Node workers have been terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604226 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604174 1 base_controller.go:113] All kube-controller-manager-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604232 1 controller_manager.go:54] kube-controller-manager-Node controller terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604239 1 builder.go:335] server exited 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604219 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604241 1 controller_manager.go:54] kube-controller-manager-operator-UnsupportedConfigOverrides controller terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604252 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-19T11:54:42.604949856Z I0319 11:54:42.602299 1 base_controller.go:181] Shutting down WorkerLatencyProfile ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604205 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604285 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604287 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604365 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604377 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604389 1 base_controller.go:181] Shutting down GuardController ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604398 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604407 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604413 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604422 1 controller_manager.go:54] RevisionController controller terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604427 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604434 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604440 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604444 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604448 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604459 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604469 1 controller_manager.go:54] GuardController controller terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604497 1 base_controller.go:123] Shutting down worker of kube-controller-manager-InstallerState controller ... 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604506 1 base_controller.go:113] All kube-controller-manager-InstallerState workers have been terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604512 1 controller_manager.go:54] kube-controller-manager-InstallerState controller terminated 2026-03-19T11:54:42.604949856Z I0319 11:54:42.604546 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"9013a068-a799-4d9f-af80-d79d01beaab1", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'PodCreateFailed' Failed to create Pod/installer-2-master-0 -n openshift-kube-controller-manager: Post "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods": context canceled 2026-03-19T11:54:42.605040908Z I0319 11:54:42.604569 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"9013a068-a799-4d9f-af80-d79d01beaab1", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' Failed to create installer pod for revision 2 count 0 on node "master-0": Post "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods": context canceled 2026-03-19T11:54:42.605040908Z W0319 11:54:42.604835 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-19T11:54:42.605040908Z W0319 11:54:42.604848 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-19T11:54:42.605040908Z W0319 11:54:42.604853 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-19T11:54:42.605040908Z E0319 11:54:42.604996 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-19T11:54:42.605040908Z E0319 11:54:42.604998 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-19T11:54:42.606798598Z E0319 11:54:42.605401 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-19T11:54:42.606798598Z I0319 11:54:42.606150 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-19T11:54:42.606798598Z I0319 11:54:42.606170 1 base_controller.go:113] All Installer workers have been terminated 2026-03-19T11:54:42.606798598Z I0319 11:54:42.606181 1 controller_manager.go:54] Installer controller terminated 2026-03-19T11:54:42.606798598Z I0319 11:54:42.606198 1 base_controller.go:123] Shutting down worker of kube-controller-manager-StaticPodState controller ... 2026-03-19T11:54:42.606798598Z I0319 11:54:42.606207 1 base_controller.go:113] All kube-controller-manager-StaticPodState workers have been terminated 2026-03-19T11:54:42.606798598Z I0319 11:54:42.606212 1 controller_manager.go:54] kube-controller-manager-StaticPodState controller terminated 2026-03-19T11:54:42.606798598Z E0319 11:54:42.606236 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-19T11:54:42.606798598Z I0319 11:54:42.606594 1 base_controller.go:123] Shutting down worker of SATokenSignerController controller ... 2026-03-19T11:54:42.606798598Z I0319 11:54:42.606612 1 base_controller.go:113] All SATokenSignerController workers have been terminated 2026-03-19T11:54:42.607926293Z I0319 11:54:42.607893 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-19T11:54:42.607926293Z I0319 11:54:42.607917 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-19T11:54:42.608610829Z E0319 11:54:42.608547 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-controller-manager/leader-election-cluster-policy-controller-role.yaml\" (string): Get \"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-kube-controller-manager/roles/system:openshift:leader-election-lock-cluster-policy-controller\": context canceled, \"assets/kube-controller-manager/leader-election-cluster-policy-controller-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/namespace-security-allocation-controller-clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/namespace-security-allocation-controller-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/podsecurity-admission-label-syncer-controller-clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/podsecurity-admission-label-syncer-controller-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/podsecurity-admission-label-privileged-namespaces-syncer-controller-clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/podsecurity-admission-label-privileged-namespaces-syncer-controller-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/namespace-openshift-infra.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/recycler-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:54:42.609603001Z E0319 11:54:42.609552 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:54:42.609803496Z I0319 11:54:42.609759 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-19T11:54:42.609803496Z I0319 11:54:42.609792 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-19T11:54:42.610891089Z I0319 11:54:42.610851 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-19T11:54:42.610891089Z I0319 11:54:42.610876 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-19T11:54:42.610891089Z I0319 11:54:42.610885 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-19T11:54:47.602003658Z I0319 11:54:47.601916 1 observer_polling.go:162] Shutting down file observer 2026-03-19T11:55:16.607641967Z E0319 11:55:16.607573 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-19T11:55:16.607641967Z W0319 11:55:16.607624 1 leaderelection.go:84] leader election lost kube-controller-manager-operator-ff989d6cc-5gvgh.json0000640000000000000000000001450415156762350033457 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-ff989d6cc-5gvgh","generateName":"kube-controller-manager-operator-ff989d6cc-","namespace":"openshift-kube-controller-manager-operator","uid":"dbcbba74-ac53-4724-a217-4d9b85e7c1db","resourceVersion":"9215","creationTimestamp":"2026-03-19T11:51:31Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"ff989d6cc"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.20/23\"],\"mac_address\":\"0a:58:0a:80:00:14\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.20/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.20\"\n ],\n \"mac\": \"0a:58:0a:80:00:14\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-ff989d6cc","uid":"228cd602-9961-4f5e-be91-80e0bbb8249f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:67c988e079558dc6b20232ebf9a7f7276fee60c756caed584c9715e0bec77a5a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:49Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:12Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:12Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:49Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.20","podIPs":[{"ip":"10.128.0.20"}],"startTime":"2026-03-19T11:52:49Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-03-19T11:56:28Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-19T11:53:17Z","finishedAt":"2026-03-19T11:55:16Z","containerID":"cri-o://b6e56f4e0942ab58cf693081930c0b921d6a49180ecc1e1f47356ba56a945538"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","containerID":"cri-o://9575c6811223a47118ebe1c3a86929b70364b064c96ab05397b49097821331c5","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-apiserver/logs/installer-2-master-0/installer_current.log0000640000000000000000000002004315156762350027211 0ustar00000000000000002026-03-19T11:58:14.954590962Z I0319 11:58:14.951523 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc000688960 cert-dir:0xc000688b40 cert-secrets:0xc0006888c0 configmaps:0xc000688460 namespace:0xc000688280 optional-cert-configmaps:0xc000688aa0 optional-cert-secrets:0xc000688a00 optional-configmaps:0xc0006885a0 optional-secrets:0xc000688500 pod:0xc000688320 pod-manifest-dir:0xc0006886e0 resource-dir:0xc000688640 revision:0xc0006881e0 secrets:0xc0006883c0 v:0xc000328f00] [0xc000328f00 0xc0006881e0 0xc000688280 0xc000688320 0xc000688640 0xc0006886e0 0xc000688460 0xc0006885a0 0xc0006883c0 0xc000688500 0xc000688b40 0xc000688960 0xc000688aa0 0xc0006888c0 0xc000688a00] [] map[cert-configmaps:0xc000688960 cert-dir:0xc000688b40 cert-secrets:0xc0006888c0 configmaps:0xc000688460 help:0xc000329680 kubeconfig:0xc000688140 log-flush-frequency:0xc000328dc0 namespace:0xc000688280 optional-cert-configmaps:0xc000688aa0 optional-cert-secrets:0xc000688a00 optional-configmaps:0xc0006885a0 optional-secrets:0xc000688500 pod:0xc000688320 pod-manifest-dir:0xc0006886e0 pod-manifests-lock-file:0xc000688820 resource-dir:0xc000688640 revision:0xc0006881e0 secrets:0xc0006883c0 timeout-duration:0xc000688780 v:0xc000328f00 vmodule:0xc000329040] [0xc000688140 0xc0006881e0 0xc000688280 0xc000688320 0xc0006883c0 0xc000688460 0xc000688500 0xc0006885a0 0xc000688640 0xc0006886e0 0xc000688780 0xc000688820 0xc0006888c0 0xc000688960 0xc000688a00 0xc000688aa0 0xc000688b40 0xc000328dc0 0xc000328f00 0xc000329040 0xc000329680] [0xc000688960 0xc000688b40 0xc0006888c0 0xc000688460 0xc000329680 0xc000688140 0xc000328dc0 0xc000688280 0xc000688aa0 0xc000688a00 0xc0006885a0 0xc000688500 0xc000688320 0xc0006886e0 0xc000688820 0xc000688640 0xc0006881e0 0xc0006883c0 0xc000688780 0xc000328f00 0xc000329040] map[104:0xc000329680 118:0xc000328f00] [] -1 0 0xc000b7a8a0 true 0xae2140 []} 2026-03-19T11:58:14.954590962Z I0319 11:58:14.951878 1 cmd.go:96] (*installerpod.InstallOptions)(0xc00084f040)({ 2026-03-19T11:58:14.954590962Z KubeConfig: (string) "", 2026-03-19T11:58:14.954590962Z KubeClient: (kubernetes.Interface) , 2026-03-19T11:58:14.954590962Z Revision: (string) (len=1) "2", 2026-03-19T11:58:14.954590962Z NodeName: (string) "", 2026-03-19T11:58:14.954590962Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-03-19T11:58:14.954590962Z Clock: (clock.RealClock) { 2026-03-19T11:58:14.954590962Z }, 2026-03-19T11:58:14.954590962Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-03-19T11:58:14.954590962Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-19T11:58:14.954590962Z (string) (len=11) "etcd-client", 2026-03-19T11:58:14.954590962Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-03-19T11:58:14.954590962Z (string) (len=31) "localhost-recovery-client-token" 2026-03-19T11:58:14.954590962Z }, 2026-03-19T11:58:14.954590962Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-19T11:58:14.954590962Z (string) (len=17) "encryption-config", 2026-03-19T11:58:14.954590962Z (string) (len=21) "webhook-authenticator" 2026-03-19T11:58:14.954590962Z }, 2026-03-19T11:58:14.954590962Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-19T11:58:14.954590962Z (string) (len=18) "kube-apiserver-pod", 2026-03-19T11:58:14.954590962Z (string) (len=6) "config", 2026-03-19T11:58:14.954590962Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-03-19T11:58:14.954590962Z (string) (len=28) "bound-sa-token-signing-certs", 2026-03-19T11:58:14.954590962Z (string) (len=15) "etcd-serving-ca", 2026-03-19T11:58:14.954590962Z (string) (len=18) "kubelet-serving-ca", 2026-03-19T11:58:14.954590962Z (string) (len=22) "sa-token-signing-certs", 2026-03-19T11:58:14.954590962Z (string) (len=29) "kube-apiserver-audit-policies" 2026-03-19T11:58:14.954590962Z }, 2026-03-19T11:58:14.954590962Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-19T11:58:14.954590962Z (string) (len=14) "oauth-metadata", 2026-03-19T11:58:14.954590962Z (string) (len=12) "cloud-config", 2026-03-19T11:58:14.954590962Z (string) (len=24) "kube-apiserver-server-ca" 2026-03-19T11:58:14.954590962Z }, 2026-03-19T11:58:14.954590962Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-03-19T11:58:14.954590962Z (string) (len=17) "aggregator-client", 2026-03-19T11:58:14.954590962Z (string) (len=30) "localhost-serving-cert-certkey", 2026-03-19T11:58:14.954590962Z (string) (len=31) "service-network-serving-certkey", 2026-03-19T11:58:14.954590962Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-03-19T11:58:14.954590962Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-03-19T11:58:14.954590962Z (string) (len=33) "bound-service-account-signing-key", 2026-03-19T11:58:14.954590962Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-03-19T11:58:14.954590962Z (string) (len=31) "check-endpoints-client-cert-key", 2026-03-19T11:58:14.954590962Z (string) (len=14) "kubelet-client", 2026-03-19T11:58:14.954590962Z (string) (len=16) "node-kubeconfigs" 2026-03-19T11:58:14.954590962Z }, 2026-03-19T11:58:14.954590962Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-03-19T11:58:14.954590962Z (string) (len=17) "user-serving-cert", 2026-03-19T11:58:14.954590962Z (string) (len=21) "user-serving-cert-000", 2026-03-19T11:58:14.954590962Z (string) (len=21) "user-serving-cert-001", 2026-03-19T11:58:14.954590962Z (string) (len=21) "user-serving-cert-002", 2026-03-19T11:58:14.954590962Z (string) (len=21) "user-serving-cert-003", 2026-03-19T11:58:14.954590962Z (string) (len=21) "user-serving-cert-004", 2026-03-19T11:58:14.954590962Z (string) (len=21) "user-serving-cert-005", 2026-03-19T11:58:14.954590962Z (string) (len=21) "user-serving-cert-006", 2026-03-19T11:58:14.954590962Z (string) (len=21) "user-serving-cert-007", 2026-03-19T11:58:14.954590962Z (string) (len=21) "user-serving-cert-008", 2026-03-19T11:58:14.954590962Z (string) (len=21) "user-serving-cert-009" 2026-03-19T11:58:14.954590962Z }, 2026-03-19T11:58:14.954590962Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-03-19T11:58:14.954590962Z (string) (len=20) "aggregator-client-ca", 2026-03-19T11:58:14.954590962Z (string) (len=9) "client-ca", 2026-03-19T11:58:14.954590962Z (string) (len=29) "control-plane-node-kubeconfig", 2026-03-19T11:58:14.954590962Z (string) (len=26) "check-endpoints-kubeconfig" 2026-03-19T11:58:14.954590962Z }, 2026-03-19T11:58:14.954590962Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-19T11:58:14.954590962Z (string) (len=17) "trusted-ca-bundle" 2026-03-19T11:58:14.954590962Z }, 2026-03-19T11:58:14.954590962Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-03-19T11:58:14.954590962Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-19T11:58:14.954590962Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-19T11:58:14.954590962Z Timeout: (time.Duration) 2m0s, 2026-03-19T11:58:14.954590962Z StaticPodManifestsLockFile: (string) "", 2026-03-19T11:58:14.954590962Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-19T11:58:14.954590962Z KubeletVersion: (string) "" 2026-03-19T11:58:14.954590962Z }) 2026-03-19T11:58:14.954590962Z I0319 11:58:14.952583 1 cmd.go:413] Getting controller reference for node master-0 2026-03-19T11:58:14.979379745Z I0319 11:58:14.978676 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-19T11:58:14.979379745Z I0319 11:58:14.978791 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-19T11:58:14.979379745Z I0319 11:58:14.978805 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-19T11:58:15.016372992Z I0319 11:58:15.015395 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-19T11:58:19.714862190Z I0319 11:58:19.712578 1 cmd.go:127] Received SIGTERM or SIGINT signal, shutting down the process. config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715156762350027215 0ustar00000000000000002026-03-19T11:53:53.251198653Z I0319 11:53:53.250947 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc00019cf00 cert-dir:0xc0002a20a0 cert-secrets:0xc00019cc80 configmaps:0xc0004bd900 namespace:0xc0004bd400 optional-cert-configmaps:0xc0002a2000 optional-cert-secrets:0xc00019d2c0 optional-configmaps:0xc0004bdb80 optional-secrets:0xc0004bda40 pod:0xc0004bd540 pod-manifest-dir:0xc0004bde00 resource-dir:0xc0004bdcc0 revision:0xc0004bd2c0 secrets:0xc0004bd680 v:0xc0002a3ae0] [0xc0002a3ae0 0xc0004bd2c0 0xc0004bd400 0xc0004bd540 0xc0004bdcc0 0xc0004bde00 0xc0004bd900 0xc0004bdb80 0xc0004bd680 0xc0004bda40 0xc0002a20a0 0xc00019cf00 0xc0002a2000 0xc00019cc80 0xc00019d2c0] [] map[cert-configmaps:0xc00019cf00 cert-dir:0xc0002a20a0 cert-secrets:0xc00019cc80 configmaps:0xc0004bd900 help:0xc0002a3ea0 kubeconfig:0xc0004bd180 log-flush-frequency:0xc0002a3a40 namespace:0xc0004bd400 optional-cert-configmaps:0xc0002a2000 optional-cert-secrets:0xc00019d2c0 optional-configmaps:0xc0004bdb80 optional-secrets:0xc0004bda40 pod:0xc0004bd540 pod-manifest-dir:0xc0004bde00 pod-manifests-lock-file:0xc00019ca00 resource-dir:0xc0004bdcc0 revision:0xc0004bd2c0 secrets:0xc0004bd680 timeout-duration:0xc00019c280 v:0xc0002a3ae0 vmodule:0xc0002a3b80] [0xc0004bd180 0xc0004bd2c0 0xc0004bd400 0xc0004bd540 0xc0004bd680 0xc0004bd900 0xc0004bda40 0xc0004bdb80 0xc0004bdcc0 0xc0004bde00 0xc00019c280 0xc00019ca00 0xc00019cc80 0xc00019cf00 0xc00019d2c0 0xc0002a2000 0xc0002a20a0 0xc0002a3a40 0xc0002a3ae0 0xc0002a3b80 0xc0002a3ea0] [0xc00019cf00 0xc0002a20a0 0xc00019cc80 0xc0004bd900 0xc0002a3ea0 0xc0004bd180 0xc0002a3a40 0xc0004bd400 0xc0002a2000 0xc00019d2c0 0xc0004bdb80 0xc0004bda40 0xc0004bd540 0xc0004bde00 0xc00019ca00 0xc0004bdcc0 0xc0004bd2c0 0xc0004bd680 0xc00019c280 0xc0002a3ae0 0xc0002a3b80] map[104:0xc0002a3ea0 118:0xc0002a3ae0] [] -1 0 0xc0000523c0 true 0xae2140 []} 2026-03-19T11:53:53.251465159Z I0319 11:53:53.251211 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0009a31e0)({ 2026-03-19T11:53:53.251465159Z KubeConfig: (string) "", 2026-03-19T11:53:53.251465159Z KubeClient: (kubernetes.Interface) , 2026-03-19T11:53:53.251465159Z Revision: (string) (len=1) "1", 2026-03-19T11:53:53.251465159Z NodeName: (string) "", 2026-03-19T11:53:53.251465159Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-03-19T11:53:53.251465159Z Clock: (clock.RealClock) { 2026-03-19T11:53:53.251465159Z }, 2026-03-19T11:53:53.251465159Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-03-19T11:53:53.251465159Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-19T11:53:53.251465159Z (string) (len=11) "etcd-client", 2026-03-19T11:53:53.251465159Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-03-19T11:53:53.251465159Z (string) (len=31) "localhost-recovery-client-token" 2026-03-19T11:53:53.251465159Z }, 2026-03-19T11:53:53.251465159Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-19T11:53:53.251465159Z (string) (len=17) "encryption-config", 2026-03-19T11:53:53.251465159Z (string) (len=21) "webhook-authenticator" 2026-03-19T11:53:53.251465159Z }, 2026-03-19T11:53:53.251465159Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-19T11:53:53.251465159Z (string) (len=18) "kube-apiserver-pod", 2026-03-19T11:53:53.251465159Z (string) (len=6) "config", 2026-03-19T11:53:53.251465159Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-03-19T11:53:53.251465159Z (string) (len=28) "bound-sa-token-signing-certs", 2026-03-19T11:53:53.251465159Z (string) (len=15) "etcd-serving-ca", 2026-03-19T11:53:53.251465159Z (string) (len=18) "kubelet-serving-ca", 2026-03-19T11:53:53.251465159Z (string) (len=22) "sa-token-signing-certs", 2026-03-19T11:53:53.251465159Z (string) (len=29) "kube-apiserver-audit-policies" 2026-03-19T11:53:53.251465159Z }, 2026-03-19T11:53:53.251465159Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-19T11:53:53.251465159Z (string) (len=14) "oauth-metadata", 2026-03-19T11:53:53.251465159Z (string) (len=12) "cloud-config", 2026-03-19T11:53:53.251465159Z (string) (len=24) "kube-apiserver-server-ca" 2026-03-19T11:53:53.251465159Z }, 2026-03-19T11:53:53.251465159Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-03-19T11:53:53.251465159Z (string) (len=17) "aggregator-client", 2026-03-19T11:53:53.251465159Z (string) (len=30) "localhost-serving-cert-certkey", 2026-03-19T11:53:53.251465159Z (string) (len=31) "service-network-serving-certkey", 2026-03-19T11:53:53.251465159Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-03-19T11:53:53.251465159Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-03-19T11:53:53.251465159Z (string) (len=33) "bound-service-account-signing-key", 2026-03-19T11:53:53.251465159Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-03-19T11:53:53.251465159Z (string) (len=31) "check-endpoints-client-cert-key", 2026-03-19T11:53:53.251465159Z (string) (len=14) "kubelet-client", 2026-03-19T11:53:53.251465159Z (string) (len=16) "node-kubeconfigs" 2026-03-19T11:53:53.251465159Z }, 2026-03-19T11:53:53.251465159Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-03-19T11:53:53.251465159Z (string) (len=17) "user-serving-cert", 2026-03-19T11:53:53.251465159Z (string) (len=21) "user-serving-cert-000", 2026-03-19T11:53:53.251465159Z (string) (len=21) "user-serving-cert-001", 2026-03-19T11:53:53.251465159Z (string) (len=21) "user-serving-cert-002", 2026-03-19T11:53:53.251465159Z (string) (len=21) "user-serving-cert-003", 2026-03-19T11:53:53.251465159Z (string) (len=21) "user-serving-cert-004", 2026-03-19T11:53:53.251465159Z (string) (len=21) "user-serving-cert-005", 2026-03-19T11:53:53.251465159Z (string) (len=21) "user-serving-cert-006", 2026-03-19T11:53:53.251465159Z (string) (len=21) "user-serving-cert-007", 2026-03-19T11:53:53.251465159Z (string) (len=21) "user-serving-cert-008", 2026-03-19T11:53:53.251465159Z (string) (len=21) "user-serving-cert-009" 2026-03-19T11:53:53.251465159Z }, 2026-03-19T11:53:53.251465159Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-03-19T11:53:53.251465159Z (string) (len=20) "aggregator-client-ca", 2026-03-19T11:53:53.251465159Z (string) (len=9) "client-ca", 2026-03-19T11:53:53.251465159Z (string) (len=29) "control-plane-node-kubeconfig", 2026-03-19T11:53:53.251465159Z (string) (len=26) "check-endpoints-kubeconfig" 2026-03-19T11:53:53.251465159Z }, 2026-03-19T11:53:53.251465159Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-19T11:53:53.251465159Z (string) (len=17) "trusted-ca-bundle" 2026-03-19T11:53:53.251465159Z }, 2026-03-19T11:53:53.251465159Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-03-19T11:53:53.251465159Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-19T11:53:53.251465159Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-19T11:53:53.251465159Z Timeout: (time.Duration) 2m0s, 2026-03-19T11:53:53.251465159Z StaticPodManifestsLockFile: (string) "", 2026-03-19T11:53:53.251465159Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-19T11:53:53.251465159Z KubeletVersion: (string) "" 2026-03-19T11:53:53.251465159Z }) 2026-03-19T11:53:53.251867469Z I0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0 2026-03-19T11:53:54.254839169Z I0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-19T11:53:54.254839169Z I0319 11:53:54.251472 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-19T11:53:54.254839169Z I0319 11:53:54.251484 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-19T11:53:54.508504932Z I0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-19T11:54:24.508927801Z I0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0 2026-03-19T11:54:38.510011047Z F0319 11:54:38.509895 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115156762350022675 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"8e508a43-99db-49eb-bf4e-e3e6a0f49761","resourceVersion":"9171","creationTimestamp":"2026-03-19T11:53:50Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.45/23\"],\"mac_address\":\"0a:58:0a:80:00:2d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.45/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.45\"\n ],\n \"mac\": \"0a:58:0a:80:00:2d\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"fa8adc44-5e09-44c3-be9b-8eee2c2280a3"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:50Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:39Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:39Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:50Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.45","podIPs":[{"ip":"10.128.0.45"}],"startTime":"2026-03-19T11:53:50Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0\nI0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0319 11:53:54.251472 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0319 11:53:54.251484 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0\nF0319 11:54:38.509895 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-19T11:53:52Z","finishedAt":"2026-03-19T11:54:38Z","containerID":"cri-o://300261e39c3fe1898b1aa4629252d5e05f336f7f74bdf1250eea81121a460d42"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","containerID":"cri-o://300261e39c3fe1898b1aa4629252d5e05f336f7f74bdf1250eea81121a460d42","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615156762350035775 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-19T11:51:13.309052168Z I0319 11:51:13.308775 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000010606015156762350032670 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-19T11:58:18.765799635Z I0319 11:58:18.765769 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:18.853478044Z I0319 11:58:18.853417 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:18.872771293Z I0319 11:58:18.872682 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:18.971821647Z I0319 11:58:18.968320 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:19.034989382Z E0319 11:58:19.034913 1 remote_available_controller.go:470] "Unhandled Error" err="v1.quota.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/quota.openshift.io/v1: 401" logger="UnhandledError" 2026-03-19T11:58:19.053014879Z I0319 11:58:19.052933 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:19.074866400Z I0319 11:58:19.074682 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:19.165562393Z I0319 11:58:19.165429 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:19.190976399Z E0319 11:58:19.190901 1 remote_available_controller.go:470] "Unhandled Error" err="v1.oauth.openshift.io failed with: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401" logger="UnhandledError" 2026-03-19T11:58:19.220834514Z E0319 11:58:19.220543 1 remote_available_controller.go:470] "Unhandled Error" err="v1.user.openshift.io failed with: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401" logger="UnhandledError" 2026-03-19T11:58:19.251970360Z I0319 11:58:19.251853 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:19.273326549Z I0319 11:58:19.272926 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:19.369983876Z I0319 11:58:19.368964 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:19.451166518Z I0319 11:58:19.451082 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:19.452812547Z E0319 11:58:19.452761 1 remote_available_controller.go:470] "Unhandled Error" err="v1.route.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/route.openshift.io/v1: 401" logger="UnhandledError" 2026-03-19T11:58:19.472066335Z I0319 11:58:19.471986 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:19.566085038Z I0319 11:58:19.565999 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:19.600360860Z I0319 11:58:19.600236 1 apf_controller.go:493] "Update CurrentCL" plName="exempt" seatDemandHighWatermark=7 seatDemandAvg=0.28438872628229384 seatDemandStdev=0.6841823153361584 seatDemandSmoothed=111.09620583395163 fairFrac=2.331974373907979 currentCL=7 concurrencyDenominator=7 backstop=false 2026-03-19T11:58:19.651849620Z I0319 11:58:19.651512 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:19.673053145Z I0319 11:58:19.672968 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:19.732284724Z E0319 11:58:19.732227 1 remote_available_controller.go:470] "Unhandled Error" err="v1.authorization.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: 401" logger="UnhandledError" 2026-03-19T11:58:19.733752489Z E0319 11:58:19.732764 1 remote_available_controller.go:470] "Unhandled Error" err="v1.build.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/build.openshift.io/v1: 401" logger="UnhandledError" 2026-03-19T11:58:19.735769348Z E0319 11:58:19.734883 1 remote_available_controller.go:470] "Unhandled Error" err="v1.apps.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/apps.openshift.io/v1: 401" logger="UnhandledError" 2026-03-19T11:58:19.765612082Z I0319 11:58:19.765542 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:19.850706099Z I0319 11:58:19.850631 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:19.872606051Z I0319 11:58:19.872513 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:19.967168766Z I0319 11:58:19.967115 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:20.052109239Z I0319 11:58:20.052046 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:20.072447743Z I0319 11:58:20.072378 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:20.165412311Z I0319 11:58:20.165340 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:20.251944142Z I0319 11:58:20.251878 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:20.271831885Z I0319 11:58:20.271745 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:20.368698106Z I0319 11:58:20.368630 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:20.451501867Z I0319 11:58:20.451429 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:20.472534318Z I0319 11:58:20.472473 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:20.567860322Z I0319 11:58:20.566848 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:20.652683322Z I0319 11:58:20.652605 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:20.672689818Z I0319 11:58:20.672619 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:20.766308371Z I0319 11:58:20.766093 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:20.851338236Z I0319 11:58:20.851264 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:20.872230613Z I0319 11:58:20.872154 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:20.971779170Z I0319 11:58:20.968802 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:21.051884125Z I0319 11:58:21.051161 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:21.072455945Z I0319 11:58:21.072372 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:21.165534965Z I0319 11:58:21.165452 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:21.251087872Z I0319 11:58:21.251017 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:21.272465432Z I0319 11:58:21.272399 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:21.365773377Z I0319 11:58:21.365688 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:21.451211222Z I0319 11:58:21.451136 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:21.471873094Z I0319 11:58:21.471816 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:21.501076673Z I0319 11:58:21.501006 1 controller.go:615] quota admission added evaluator for: machinehealthchecks.machine.openshift.io 2026-03-19T11:58:21.501111204Z I0319 11:58:21.501076 1 controller.go:615] quota admission added evaluator for: machinehealthchecks.machine.openshift.io 2026-03-19T11:58:21.597499974Z I0319 11:58:21.597154 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:21.650950762Z I0319 11:58:21.650853 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:21.672756021Z I0319 11:58:21.672644 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:21.765570335Z I0319 11:58:21.765496 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:21.851349348Z I0319 11:58:21.851210 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:21.872127312Z I0319 11:58:21.872054 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:21.966051643Z I0319 11:58:21.965967 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:22.050840331Z I0319 11:58:22.050751 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:22.072822055Z I0319 11:58:22.072765 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:22.166151452Z I0319 11:58:22.166063 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:22.250981301Z I0319 11:58:22.250908 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:22.272715589Z I0319 11:58:22.272640 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:22.367029549Z I0319 11:58:22.366932 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:22.450769362Z I0319 11:58:22.450691 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:22.473115625Z I0319 11:58:22.473036 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:22.565488248Z I0319 11:58:22.565399 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:22.651363923Z I0319 11:58:22.651294 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:22.672658351Z I0319 11:58:22.672590 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:22.766920109Z I0319 11:58:22.766803 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:22.851062062Z I0319 11:58:22.850958 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:22.873405535Z I0319 11:58:22.873316 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:22.968093154Z I0319 11:58:22.967088 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:23.051577911Z I0319 11:58:23.051433 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:23.072610522Z I0319 11:58:23.072531 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:23.165997860Z I0319 11:58:23.165891 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:23.250880071Z I0319 11:58:23.250814 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:23.273168821Z I0319 11:58:23.273098 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:23.369919152Z I0319 11:58:23.367195 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:23.450806775Z I0319 11:58:23.450746 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:23.472602035Z I0319 11:58:23.472529 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:23.565774856Z I0319 11:58:23.565684 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:23.651144989Z I0319 11:58:23.651035 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:23.671885283Z I0319 11:58:23.671824 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:23.766349277Z I0319 11:58:23.766264 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:23.850883550Z I0319 11:58:23.850791 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:23.872293429Z I0319 11:58:23.872217 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:23.967515681Z I0319 11:58:23.967453 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:24.052120416Z I0319 11:58:24.052065 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:24.082992126Z I0319 11:58:24.082288 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:24.165354386Z I0319 11:58:24.165291 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:24.251166069Z I0319 11:58:24.251092 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:24.271878142Z I0319 11:58:24.271810 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:24.365918136Z I0319 11:58:24.365845 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:24.450847328Z I0319 11:58:24.450782 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:24.472717789Z I0319 11:58:24.472661 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:24.566602958Z I0319 11:58:24.566517 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:24.650526416Z I0319 11:58:24.650420 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:58:24.672782197Z I0319 11:58:24.672671 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015156762350031155 0ustar00000000000000002026-03-19T11:51:06.958168349Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000007467715156762350037114 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-8b68b9d9b-pjc7h2026-03-19T11:57:57.301607121Z LastFailedTime: (*v1.Time)(0xc0069e6090)(2026-03-19 11:57:12 +0000 UTC), 2026-03-19T11:57:57.301607121Z LastFailedReason: (string) (len=15) "InstallerFailed", 2026-03-19T11:57:57.301607121Z LastFailedCount: (int) 1, 2026-03-19T11:57:57.301607121Z LastFallbackCount: (int) 0, 2026-03-19T11:57:57.301607121Z LastFailedRevisionErrors: ([]string) (len=1 cap=1) { 2026-03-19T11:57:57.301607121Z (string) (len=2059) "installer: ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) ,\n KubeletVersion: (string) \"\"\n})\nI0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0\nI0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0319 11:53:54.251472 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0319 11:53:54.251484 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0\nF0319 11:54:38.509895 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n" 2026-03-19T11:57:57.301607121Z } 2026-03-19T11:57:57.301607121Z } 2026-03-19T11:57:57.301607121Z because new revision pending 2026-03-19T11:57:57.303627501Z W0319 11:57:57.303588 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-03-19T11:57:57.303627501Z W0319 11:57:57.303607 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-03-19T11:57:57.303627501Z W0319 11:57:57.303612 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-19T11:57:57.303627501Z W0319 11:57:57.303616 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-19T11:57:57.303627501Z W0319 11:57:57.303619 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-19T11:57:57.335560265Z I0319 11:57:57.335476 1 status_controller.go:225] clusteroperator/kube-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-19T11:52:52Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-19T11:53:47Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-19T11:52:53Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-19T11:52:52Z","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-19T11:52:52Z","message":"All is well","reason":"AsExpected","status":"False","type":"EvaluationConditionsDetected"}]}} 2026-03-19T11:57:57.336212112Z I0319 11:57:57.336167 1 prune_controller.go:277] Nothing to prune 2026-03-19T11:57:57.336590530Z I0319 11:57:57.336533 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-19T11:57:57.347973007Z I0319 11:57:57.347908 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"5b370e1e-b271-4811-9bc5-0ec715e06847", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-apiserver changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0319 11:53:54.251472 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0319 11:53:54.251484 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0319 11:54:38.509895 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: " to "NodeControllerDegraded: All master nodes are ready",Progressing message changed from "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1" to "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2",Available message changed from "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1" to "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2" 2026-03-19T11:57:57.494211018Z I0319 11:57:57.494139 1 request.go:700] Waited for 1.090650993s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/services/apiserver 2026-03-19T11:57:58.299919021Z I0319 11:57:58.299853 1 prune_controller.go:277] Nothing to prune 2026-03-19T11:57:58.300623668Z I0319 11:57:58.300089 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"5b370e1e-b271-4811-9bc5-0ec715e06847", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/bound-sa-token-signing-certs-3 -n openshift-kube-apiserver because it was missing 2026-03-19T11:57:58.494376392Z I0319 11:57:58.494285 1 request.go:700] Waited for 1.190323222s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dopenshift-kube-apiserver 2026-03-19T11:57:59.495096842Z I0319 11:57:59.495015 1 request.go:700] Waited for 1.978925921s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/serviceaccounts/localhost-recovery-client 2026-03-19T11:58:00.520234613Z I0319 11:58:00.520166 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"5b370e1e-b271-4811-9bc5-0ec715e06847", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/etcd-serving-ca-3 -n openshift-kube-apiserver because it was missing 2026-03-19T11:58:00.520832618Z I0319 11:58:00.520790 1 prune_controller.go:277] Nothing to prune 2026-03-19T11:58:00.694846793Z I0319 11:58:00.694795 1 request.go:700] Waited for 1.592501058s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/serviceaccounts/installer-sa 2026-03-19T11:58:01.894780419Z I0319 11:58:01.894704 1 request.go:700] Waited for 1.374520626s due to client-side throttling, not priority and fairness, request: POST:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps 2026-03-19T11:58:01.911824763Z I0319 11:58:01.911756 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"5b370e1e-b271-4811-9bc5-0ec715e06847", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kube-apiserver-server-ca-3 -n openshift-kube-apiserver because it was missing 2026-03-19T11:58:01.912128490Z I0319 11:58:01.912087 1 prune_controller.go:277] Nothing to prune 2026-03-19T11:58:02.137162205Z I0319 11:58:02.137062 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"5b370e1e-b271-4811-9bc5-0ec715e06847", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-2-master-0 -n openshift-kube-apiserver because it was missing 2026-03-19T11:58:03.094488501Z I0319 11:58:03.094409 1 request.go:700] Waited for 1.182667647s due to client-side throttling, not priority and fairness, request: POST:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps 2026-03-19T11:58:03.198125057Z I0319 11:58:03.196404 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"5b370e1e-b271-4811-9bc5-0ec715e06847", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kubelet-serving-ca-3 -n openshift-kube-apiserver because it was missing 2026-03-19T11:58:03.205865595Z I0319 11:58:03.205790 1 prune_controller.go:277] Nothing to prune 2026-03-19T11:58:03.318809528Z I0319 11:58:03.318694 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-03-19T11:58:03.400991412Z I0319 11:58:03.400888 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-19T11:58:04.094752908Z I0319 11:58:04.094654 1 request.go:700] Waited for 1.771959236s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/serviceaccounts/localhost-recovery-client 2026-03-19T11:58:04.900142934Z I0319 11:58:04.900051 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"5b370e1e-b271-4811-9bc5-0ec715e06847", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/sa-token-signing-certs-3 -n openshift-kube-apiserver because it was missing 2026-03-19T11:58:04.900254937Z I0319 11:58:04.900215 1 prune_controller.go:277] Nothing to prune 2026-03-19T11:58:05.094823791Z I0319 11:58:05.094757 1 request.go:700] Waited for 1.764361721s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods/kube-apiserver-master-0 2026-03-19T11:58:06.095202293Z I0319 11:58:06.095131 1 request.go:700] Waited for 1.785554967s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/node-kubeconfigs 2026-03-19T11:58:06.904458473Z I0319 11:58:06.904388 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"5b370e1e-b271-4811-9bc5-0ec715e06847", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kube-apiserver-audit-policies-3 -n openshift-kube-apiserver because it was missing 2026-03-19T11:58:06.905114918Z I0319 11:58:06.905082 1 prune_controller.go:277] Nothing to prune 2026-03-19T11:58:07.294386131Z I0319 11:58:07.294329 1 request.go:700] Waited for 1.183132529s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/node-kubeconfigs 2026-03-19T11:58:08.259383232Z I0319 11:58:08.258572 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-03-19T11:58:08.259383232Z I0319 11:58:08.259272 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"5b370e1e-b271-4811-9bc5-0ec715e06847", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/etcd-client-3 -n openshift-kube-apiserver because it was missing 2026-03-19T11:58:10.894503856Z I0319 11:58:10.894415 1 request.go:700] Waited for 1.068831382s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dopenshift-kube-apiserver 2026-03-19T11:58:11.060793134Z I0319 11:58:11.058358 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"5b370e1e-b271-4811-9bc5-0ec715e06847", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/localhost-recovery-serving-certkey-3 -n openshift-kube-apiserver because it was missing 2026-03-19T11:58:11.525298113Z I0319 11:58:11.524012 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-03-19T11:58:11.885981942Z I0319 11:58:11.883169 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"5b370e1e-b271-4811-9bc5-0ec715e06847", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/localhost-recovery-client-token-3 -n openshift-kube-apiserver because it was missing 2026-03-19T11:58:12.095626522Z I0319 11:58:12.095504 1 request.go:700] Waited for 1.035012442s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller 2026-03-19T11:58:13.145106815Z W0319 11:58:13.144986 1 degraded_webhook.go:147] failed to connect to webhook "alertmanagerconfigs.monitoring.coreos.com" via service "prometheus-operator-admission-webhook.openshift-monitoring.svc:8443": dial tcp 172.30.90.28:8443: connect: connection refused 2026-03-19T11:58:13.227935736Z I0319 11:58:13.227849 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"5b370e1e-b271-4811-9bc5-0ec715e06847", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/webhook-authenticator-3 -n openshift-kube-apiserver because it was missing 2026-03-19T11:58:13.295263841Z I0319 11:58:13.295188 1 request.go:700] Waited for 1.125773706s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver 2026-03-19T11:58:13.906810051Z I0319 11:58:13.905143 1 prune_controller.go:277] Nothing to prune 2026-03-19T11:58:13.906810051Z I0319 11:58:13.905359 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"5b370e1e-b271-4811-9bc5-0ec715e06847", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RevisionTriggered' new revision 3 triggered by "required configmap/config has changed" 2026-03-19T11:58:14.008024608Z I0319 11:58:14.002332 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-19T11:58:14.063823133Z I0319 11:58:14.063452 1 prune_controller.go:277] Nothing to prune 2026-03-19T11:58:14.165529283Z W0319 11:58:14.163685 1 degraded_webhook.go:147] failed to connect to webhook "alertmanagerconfigs.monitoring.coreos.com" via service "prometheus-operator-admission-webhook.openshift-monitoring.svc:8443": dial tcp 172.30.90.28:8443: connect: connection refused 2026-03-19T11:58:14.716247045Z I0319 11:58:14.716188 1 request.go:700] Waited for 1.189015941s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dopenshift-kube-apiserver 2026-03-19T11:58:15.303179767Z I0319 11:58:15.302744 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-03-19T11:58:15.894806613Z I0319 11:58:15.894740 1 request.go:700] Waited for 1.777519272s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/node-kubeconfigs 2026-03-19T11:58:16.198931887Z I0319 11:58:16.198838 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-19T11:58:16.201244754Z I0319 11:58:16.200480 1 prune_controller.go:277] Nothing to prune 2026-03-19T11:58:16.288778199Z W0319 11:58:16.285826 1 degraded_webhook.go:147] failed to connect to webhook "alertmanagerconfigs.monitoring.coreos.com" via service "prometheus-operator-admission-webhook.openshift-monitoring.svc:8443": dial tcp 172.30.90.28:8443: connect: connection refused 2026-03-19T11:58:16.894959588Z I0319 11:58:16.894895 1 request.go:700] Waited for 1.580975968s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dopenshift-kube-apiserver 2026-03-19T11:58:17.291710391Z W0319 11:58:17.291618 1 degraded_webhook.go:147] failed to connect to webhook "alertmanagerconfigs.monitoring.coreos.com" via service "prometheus-operator-admission-webhook.openshift-monitoring.svc:8443": dial tcp 172.30.90.28:8443: connect: connection refused 2026-03-19T11:58:17.899228483Z I0319 11:58:17.899162 1 request.go:700] Waited for 1.69760366s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/node-kubeconfigs 2026-03-19T11:58:19.098152686Z I0319 11:58:19.095274 1 request.go:700] Waited for 1.590083471s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/serviceaccounts/installer-sa 2026-03-19T11:58:19.365053936Z I0319 11:58:19.364521 1 prune_controller.go:277] Nothing to prune 2026-03-19T11:58:19.383351500Z I0319 11:58:19.382283 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-19T11:58:19.704238252Z I0319 11:58:19.703045 1 installer_controller.go:540] "master-0" moving to (v1.NodeStatus) { 2026-03-19T11:58:19.704238252Z NodeName: (string) (len=8) "master-0", 2026-03-19T11:58:19.704238252Z CurrentRevision: (int32) 0, 2026-03-19T11:58:19.704238252Z TargetRevision: (int32) 3, 2026-03-19T11:58:19.704238252Z LastFailedRevision: (int32) 1, 2026-03-19T11:58:19.704238252Z LastFailedTime: (*v1.Time)(0xc004e32390)(2026-03-19 11:57:12 +0000 UTC), 2026-03-19T11:58:19.704238252Z LastFailedReason: (string) (len=15) "InstallerFailed", 2026-03-19T11:58:19.704238252Z LastFailedCount: (int) 1, 2026-03-19T11:58:19.704238252Z LastFallbackCount: (int) 0, 2026-03-19T11:58:19.704238252Z LastFailedRevisionErrors: ([]string) (len=1 cap=1) { 2026-03-19T11:58:19.704238252Z (string) (len=2059) "installer: ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) ,\n KubeletVersion: (string) \"\"\n})\nI0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0\nI0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0319 11:53:54.251472 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0319 11:53:54.251484 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0\nF0319 11:54:38.509895 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n" 2026-03-19T11:58:19.704238252Z } 2026-03-19T11:58:19.704238252Z } 2026-03-19T11:58:19.704238252Z because new revision pending 2026-03-19T11:58:19.705683858Z W0319 11:58:19.705644 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-03-19T11:58:19.705683858Z W0319 11:58:19.705670 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-03-19T11:58:19.705683858Z W0319 11:58:19.705675 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-19T11:58:19.705683858Z W0319 11:58:19.705678 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-19T11:58:19.705704758Z W0319 11:58:19.705682 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-19T11:58:19.742779298Z I0319 11:58:19.740030 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-19T11:58:19.743594298Z I0319 11:58:19.743556 1 status_controller.go:225] clusteroperator/kube-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-19T11:52:52Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-19T11:53:47Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-19T11:52:53Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-19T11:52:52Z","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-19T11:52:52Z","message":"All is well","reason":"AsExpected","status":"False","type":"EvaluationConditionsDetected"}]}} 2026-03-19T11:58:19.743884645Z I0319 11:58:19.743850 1 prune_controller.go:277] Nothing to prune 2026-03-19T11:58:19.756174904Z I0319 11:58:19.755611 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"5b370e1e-b271-4811-9bc5-0ec715e06847", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-apiserver changed: Progressing message changed from "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2" to "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3",Available message changed from "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2" to "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3" 2026-03-19T11:58:20.494867570Z I0319 11:58:20.494788 1 request.go:700] Waited for 1.118376646s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods/kube-apiserver-master-0 2026-03-19T11:58:21.495057867Z I0319 11:58:21.495002 1 request.go:700] Waited for 1.740282707s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods/kube-apiserver-master-0 2026-03-19T11:58:22.694594613Z I0319 11:58:22.694507 1 request.go:700] Waited for 1.796774599s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps/kube-apiserver-server-ca 2026-03-19T11:58:23.705284574Z I0319 11:58:23.703254 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"5b370e1e-b271-4811-9bc5-0ec715e06847", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-3-master-0 -n openshift-kube-apiserver because it was missing 2026-03-19T11:58:23.995787019Z E0319 11:58:23.995689 1 degraded_webhook.go:68] prometheusrules.openshift.io: skipping checking the webhook "prometheusrules.openshift.io" via "prometheus-operator-admission-webhook.openshift-monitoring.svc:8443" service because the caBundle (provided by the service-ca-operator) is empty. Please check the service-ca's logs if the issue persists 2026-03-19T11:58:24.074213973Z I0319 11:58:24.074128 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-19T11:58:24.081780096Z I0319 11:58:24.079606 1 prune_controller.go:277] Nothing to prune kube-apiserver-operator_previous.log0000640000000000000000000003776015156762350037276 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-8b68b9d9b-pjc7h2026-03-19T11:54:11.584903967Z I0319 11:54:11.584888 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionCondition controller ... 2026-03-19T11:54:11.584903967Z I0319 11:54:11.584895 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionCondition workers have been terminated 2026-03-19T11:54:11.584903967Z I0319 11:54:11.584901 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionMigration controller ... 2026-03-19T11:54:11.584914917Z I0319 11:54:11.584907 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionMigration workers have been terminated 2026-03-19T11:54:11.584944318Z I0319 11:54:11.584932 1 base_controller.go:181] Shutting down PruneController ... 2026-03-19T11:54:11.584967739Z I0319 11:54:11.584943 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-19T11:54:11.585011750Z I0319 11:54:11.584999 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-19T11:54:11.585051140Z I0319 11:54:11.585039 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-19T11:54:11.585102512Z I0319 11:54:11.585077 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-19T11:54:11.585146802Z I0319 11:54:11.585135 1 base_controller.go:181] Shutting down WorkerLatencyProfile ... 2026-03-19T11:54:11.585209464Z I0319 11:54:11.585196 1 base_controller.go:181] Shutting down StatusSyncer_kube-apiserver ... 2026-03-19T11:54:11.585236874Z I0319 11:54:11.585227 1 base_controller.go:159] All StatusSyncer_kube-apiserver post start hooks have been terminated 2026-03-19T11:54:11.585273036Z I0319 11:54:11.585263 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-19T11:54:11.585312547Z I0319 11:54:11.585300 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-19T11:54:11.585343578Z I0319 11:54:11.585333 1 base_controller.go:113] All Installer workers have been terminated 2026-03-19T11:54:11.585372508Z I0319 11:54:11.585362 1 controller_manager.go:54] Installer controller terminated 2026-03-19T11:54:11.585407469Z I0319 11:54:11.585395 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-19T11:54:11.585466460Z E0319 11:54:11.585417 1 base_controller.go:279] "Unhandled Error" err="webhookSupportabilityController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-19T11:54:11.585466460Z I0319 11:54:11.585425 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-19T11:54:11.585466460Z I0319 11:54:11.585453 1 controller_manager.go:54] PruneController controller terminated 2026-03-19T11:54:11.585466460Z I0319 11:54:11.584961 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:54:11.585546272Z I0319 11:54:11.585505 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-19T11:54:11.585546272Z I0319 11:54:11.585521 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:54:11.585546272Z I0319 11:54:11.585534 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-19T11:54:11.585560983Z I0319 11:54:11.585543 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:54:11.585570043Z I0319 11:54:11.585553 1 base_controller.go:123] Shutting down worker of BoundSATokenSignerController controller ... 2026-03-19T11:54:11.585570043Z I0319 11:54:11.585560 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-19T11:54:11.585581053Z I0319 11:54:11.585574 1 base_controller.go:123] Shutting down worker of CertRotationTimeUpgradeableController controller ... 2026-03-19T11:54:11.585581053Z I0319 11:54:11.585577 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:54:11.585590293Z I0319 11:54:11.585582 1 base_controller.go:113] All CertRotationTimeUpgradeableController workers have been terminated 2026-03-19T11:54:11.585599053Z I0319 11:54:11.584953 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:54:11.585607194Z I0319 11:54:11.585595 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-19T11:54:11.585615584Z I0319 11:54:11.585606 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:54:11.585615584Z I0319 11:54:11.585589 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-19T11:54:11.585629704Z I0319 11:54:11.585617 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-19T11:54:11.585629704Z I0319 11:54:11.585619 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:54:11.585629704Z I0319 11:54:11.585625 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:54:11.585638734Z I0319 11:54:11.585615 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-2884029820/tls.crt::/tmp/serving-cert-2884029820/tls.key" 2026-03-19T11:54:11.585647334Z I0319 11:54:11.585640 1 base_controller.go:123] Shutting down worker of cluster-kube-apiserver-operator-UnsupportedConfigOverrides controller ... 2026-03-19T11:54:11.585655745Z I0319 11:54:11.585644 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-19T11:54:11.585655745Z I0319 11:54:11.585650 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-19T11:54:11.585665545Z I0319 11:54:11.585654 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-19T11:54:11.585665545Z I0319 11:54:11.585644 1 base_controller.go:181] Shutting down kube-apiserver-StaticPodState ... 2026-03-19T11:54:11.585673985Z I0319 11:54:11.585663 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-19T11:54:11.585673985Z I0319 11:54:11.585666 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-19T11:54:11.585673985Z I0319 11:54:11.585668 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-19T11:54:11.585699406Z I0319 11:54:11.585671 1 base_controller.go:181] Shutting down GuardController ... 2026-03-19T11:54:11.585699406Z I0319 11:54:11.585676 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:54:11.585699406Z I0319 11:54:11.585673 1 controller_manager.go:54] RevisionController controller terminated 2026-03-19T11:54:11.585699406Z I0319 11:54:11.585679 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-19T11:54:11.585699406Z I0319 11:54:11.585505 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-19T11:54:11.585699406Z I0319 11:54:11.585659 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:54:11.585712006Z I0319 11:54:11.585683 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-19T11:54:11.585712006Z I0319 11:54:11.585703 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-19T11:54:11.585720746Z I0319 11:54:11.585703 1 base_controller.go:181] Shutting down ServiceAccountIssuerController ... 2026-03-19T11:54:11.585720746Z I0319 11:54:11.585707 1 base_controller.go:181] Shutting down kube-apiserver-RemoveStaleConditions ... 2026-03-19T11:54:11.585757457Z I0319 11:54:11.585682 1 certrotationcontroller.go:828] Shutting down CertRotation 2026-03-19T11:54:11.585765887Z I0319 11:54:11.585755 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-19T11:54:11.585774077Z I0319 11:54:11.585766 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-19T11:54:11.585774077Z I0319 11:54:11.585770 1 base_controller.go:123] Shutting down worker of kube-apiserver-RemoveStaleConditions controller ... 2026-03-19T11:54:11.585787117Z I0319 11:54:11.585776 1 base_controller.go:113] All kube-apiserver-RemoveStaleConditions workers have been terminated 2026-03-19T11:54:11.585787117Z I0319 11:54:11.585776 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-19T11:54:11.585787117Z I0319 11:54:11.585777 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-19T11:54:11.585787117Z I0319 11:54:11.585784 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-19T11:54:11.585796498Z I0319 11:54:11.585787 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-apiserver controller ... 2026-03-19T11:54:11.585796498Z I0319 11:54:11.585790 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:54:11.585796498Z I0319 11:54:11.585791 1 base_controller.go:113] All StatusSyncer_kube-apiserver workers have been terminated 2026-03-19T11:54:11.585850959Z I0319 11:54:11.585817 1 base_controller.go:181] Shutting down highCPUUsageAlertController ... 2026-03-19T11:54:11.585850959Z I0319 11:54:11.585817 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-19T11:54:11.585850959Z I0319 11:54:11.585827 1 base_controller.go:123] Shutting down worker of ServiceAccountIssuerController controller ... 2026-03-19T11:54:11.585850959Z I0319 11:54:11.585834 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-19T11:54:11.585850959Z I0319 11:54:11.585836 1 base_controller.go:113] All ServiceAccountIssuerController workers have been terminated 2026-03-19T11:54:11.585850959Z I0319 11:54:11.585842 1 base_controller.go:123] Shutting down worker of kube-apiserver-StaticPodState controller ... 2026-03-19T11:54:11.585863999Z I0319 11:54:11.585850 1 base_controller.go:113] All kube-apiserver-StaticPodState workers have been terminated 2026-03-19T11:54:11.585863999Z I0319 11:54:11.585853 1 base_controller.go:123] Shutting down worker of highCPUUsageAlertController controller ... 2026-03-19T11:54:11.585863999Z I0319 11:54:11.585856 1 controller_manager.go:54] kube-apiserver-StaticPodState controller terminated 2026-03-19T11:54:11.585863999Z I0319 11:54:11.585658 1 base_controller.go:113] All cluster-kube-apiserver-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-19T11:54:11.585863999Z I0319 11:54:11.585859 1 base_controller.go:113] All highCPUUsageAlertController workers have been terminated 2026-03-19T11:54:11.585874669Z I0319 11:54:11.585693 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-19T11:54:11.585874669Z I0319 11:54:11.585865 1 controller_manager.go:54] cluster-kube-apiserver-operator-UnsupportedConfigOverrides controller terminated 2026-03-19T11:54:11.585874669Z I0319 11:54:11.585712 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-19T11:54:11.585883630Z I0319 11:54:11.585872 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-19T11:54:11.585883630Z I0319 11:54:11.585876 1 controller_manager.go:54] GuardController controller terminated 2026-03-19T11:54:11.585883630Z I0319 11:54:11.585691 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-19T11:54:11.585892870Z I0319 11:54:11.585887 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:54:11.585892870Z I0319 11:54:11.585824 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionKey controller ... 2026-03-19T11:54:11.585920870Z I0319 11:54:11.585896 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionKey workers have been terminated 2026-03-19T11:54:11.585962641Z I0319 11:54:11.585567 1 base_controller.go:113] All BoundSATokenSignerController workers have been terminated 2026-03-19T11:54:11.585990202Z I0319 11:54:11.585943 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-19T11:54:11.586022293Z I0319 11:54:11.586011 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-19T11:54:11.586052383Z I0319 11:54:11.586042 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-19T11:54:11.586455982Z I0319 11:54:11.586382 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-19T11:54:11.586455982Z I0319 11:54:11.586412 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-19T11:54:11.586455982Z I0319 11:54:11.586422 1 builder.go:335] server exited 2026-03-19T11:54:11.587186889Z I0319 11:54:11.587142 1 base_controller.go:123] Shutting down worker of webhookSupportabilityController controller ... 2026-03-19T11:54:11.587186889Z I0319 11:54:11.587172 1 base_controller.go:113] All webhookSupportabilityController workers have been terminated 2026-03-19T11:54:11.591090947Z E0319 11:54:11.591039 1 base_controller.go:279] "Unhandled Error" err="KubeAPIServerStaticResources-StaticResources reconciliation failed: [\"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\" (string): Get \"https://172.30.0.1:443/apis/apiextensions.k8s.io/v1/customresourcedefinitions/apirequestcounts.apiserver.openshift.io\": context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/api-usage.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/audit-errors.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-requests.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-basic.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/podsecurity-violations.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-extended.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeAPIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:54:11.592600351Z I0319 11:54:11.592569 1 base_controller.go:123] Shutting down worker of KubeAPIServerStaticResources-StaticResources controller ... 2026-03-19T11:54:11.592617021Z I0319 11:54:11.592600 1 base_controller.go:113] All KubeAPIServerStaticResources-StaticResources workers have been terminated 2026-03-19T11:54:11.959681294Z W0319 11:54:11.957341 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-pjc7h.json0000640000000000000000000001362415156762350030061 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-8b68b9d9b-pjc7h","generateName":"kube-apiserver-operator-8b68b9d9b-","namespace":"openshift-kube-apiserver-operator","uid":"39d3ac31-9259-454b-8e1c-e23024f8f2b2","resourceVersion":"8940","creationTimestamp":"2026-03-19T11:51:32Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"8b68b9d9b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.19/23\"],\"mac_address\":\"0a:58:0a:80:00:13\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.19/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.19\"\n ],\n \"mac\": \"0a:58:0a:80:00:13\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-8b68b9d9b","uid":"16a10a6c-9365-45c2-87ae-0fd2a7008c49","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:51Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:49Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:13Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:13Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:49Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.19","podIPs":[{"ip":"10.128.0.19"}],"startTime":"2026-03-19T11:52:49Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-03-19T11:54:13Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-19T11:52:51Z","finishedAt":"2026-03-19T11:54:12Z","containerID":"cri-o://5e2f36e1befc8e73ca3645b7b8f74e7be8e2177e72629e38b72062f0d512ab82"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","containerID":"cri-o://3df2e0aeecd7a4f19adde17efa6cfd363a148088a31fc3ab4825b957d359b489","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007425015156762350025214 0ustar00000000000000002026-03-19T11:54:14.668015758Z cluster-etcd-operator rev \ 2026-03-19T11:54:14.668015758Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-03-19T11:54:14.668015758Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-03-19T11:54:14.668015758Z --client-key-file=$(ETCDCTL_KEY) \ 2026-03-19T11:54:14.668015758Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-03-19T11:54:14.668015758Z securityContext: 2026-03-19T11:54:14.668015758Z privileged: true 2026-03-19T11:54:14.668015758Z resources: 2026-03-19T11:54:14.668015758Z requests: 2026-03-19T11:54:14.668015758Z memory: 50Mi 2026-03-19T11:54:14.668015758Z cpu: 10m 2026-03-19T11:54:14.668015758Z env: 2026-03-19T11:54:14.668015758Z - name: "ALL_ETCD_ENDPOINTS" 2026-03-19T11:54:14.668015758Z value: "https://192.168.32.10:2379" 2026-03-19T11:54:14.668015758Z - name: "ETCDCTL_API" 2026-03-19T11:54:14.668015758Z value: "3" 2026-03-19T11:54:14.668015758Z - name: "ETCDCTL_CACERT" 2026-03-19T11:54:14.668015758Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-03-19T11:54:14.668015758Z - name: "ETCDCTL_CERT" 2026-03-19T11:54:14.668015758Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-03-19T11:54:14.668015758Z - name: "ETCDCTL_ENDPOINTS" 2026-03-19T11:54:14.668015758Z value: "https://192.168.32.10:2379" 2026-03-19T11:54:14.668015758Z - name: "ETCDCTL_KEY" 2026-03-19T11:54:14.668015758Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-03-19T11:54:14.668015758Z - name: "ETCD_CIPHER_SUITES" 2026-03-19T11:54:14.668015758Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-03-19T11:54:14.668015758Z - name: "ETCD_DATA_DIR" 2026-03-19T11:54:14.668015758Z value: "/var/lib/etcd" 2026-03-19T11:54:14.668015758Z - name: "ETCD_ELECTION_TIMEOUT" 2026-03-19T11:54:14.668015758Z value: "2500" 2026-03-19T11:54:14.668015758Z - name: "ETCD_ENABLE_PPROF" 2026-03-19T11:54:14.668244693Z value: "true" 2026-03-19T11:54:14.668244693Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-03-19T11:54:14.668244693Z value: "1" 2026-03-19T11:54:14.668244693Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-03-19T11:54:14.668244693Z value: "200ms" 2026-03-19T11:54:14.668244693Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-03-19T11:54:14.668244693Z value: "5s" 2026-03-19T11:54:14.668244693Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-03-19T11:54:14.668244693Z value: "500" 2026-03-19T11:54:14.668244693Z - name: "ETCD_IMAGE" 2026-03-19T11:54:14.668244693Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278" 2026-03-19T11:54:14.668244693Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-03-19T11:54:14.668244693Z value: "existing" 2026-03-19T11:54:14.668244693Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-03-19T11:54:14.668244693Z value: "8589934592" 2026-03-19T11:54:14.668244693Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-03-19T11:54:14.668244693Z value: "true" 2026-03-19T11:54:14.668244693Z - name: "ETCD_TLS_MIN_VERSION" 2026-03-19T11:54:14.668244693Z value: "TLS1.2" 2026-03-19T11:54:14.668244693Z - name: "NODE_master_0_ETCD_NAME" 2026-03-19T11:54:14.668244693Z value: "master-0" 2026-03-19T11:54:14.668244693Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-03-19T11:54:14.668244693Z value: "192.168.32.10" 2026-03-19T11:54:14.668244693Z - name: "NODE_master_0_IP" 2026-03-19T11:54:14.668244693Z value: "192.168.32.10" 2026-03-19T11:54:14.668244693Z volumeMounts: 2026-03-19T11:54:14.668244693Z - mountPath: /var/lib/etcd 2026-03-19T11:54:14.668244693Z name: data-dir 2026-03-19T11:54:14.668244693Z - mountPath: /etc/kubernetes/static-pod-certs 2026-03-19T11:54:14.668244693Z name: cert-dir 2026-03-19T11:54:14.668244693Z hostNetwork: true 2026-03-19T11:54:14.668244693Z priority: 2000001000 2026-03-19T11:54:14.668244693Z priorityClassName: system-node-critical 2026-03-19T11:54:14.668244693Z tolerations: 2026-03-19T11:54:14.668244693Z - operator: "Exists" 2026-03-19T11:54:14.668244693Z volumes: 2026-03-19T11:54:14.668244693Z - hostPath: 2026-03-19T11:54:14.668244693Z path: /etc/kubernetes/manifests 2026-03-19T11:54:14.668244693Z name: static-pod-dir 2026-03-19T11:54:14.668244693Z - hostPath: 2026-03-19T11:54:14.668244693Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-03-19T11:54:14.668244693Z name: resource-dir 2026-03-19T11:54:14.668244693Z - hostPath: 2026-03-19T11:54:14.668244693Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-03-19T11:54:14.668244693Z name: cert-dir 2026-03-19T11:54:14.668244693Z - hostPath: 2026-03-19T11:54:14.668244693Z path: /var/lib/etcd 2026-03-19T11:54:14.668244693Z type: "" 2026-03-19T11:54:14.668244693Z name: data-dir 2026-03-19T11:54:14.668244693Z - hostPath: 2026-03-19T11:54:14.668244693Z path: /usr/local/bin 2026-03-19T11:54:14.668244693Z name: usr-local-bin 2026-03-19T11:54:14.668244693Z - hostPath: 2026-03-19T11:54:14.668244693Z path: /var/log/etcd 2026-03-19T11:54:14.668244693Z name: log-dir 2026-03-19T11:54:14.668244693Z - hostPath: 2026-03-19T11:54:14.668244693Z path: /etc/kubernetes 2026-03-19T11:54:14.668244693Z name: config-dir 2026-03-19T11:54:14.668244693Z - hostPath: 2026-03-19T11:54:14.668244693Z path: /var/lib/etcd-auto-backup 2026-03-19T11:54:14.668244693Z name: etcd-auto-backup-dir 2026-03-19T11:54:14.743782221Z I0319 11:54:14.743671 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-03-19T11:54:14.744209141Z I0319 11:54:14.744158 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-19T11:54:14.744209141Z I0319 11:54:14.744176 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-19T11:54:14.744209141Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} 2026-03-19T11:54:28.749770891Z W0319 11:54:28.749555 1 recorder.go:207] Error creating event &Event{ObjectMeta:{installer-1-master-0.189e3bfb88badd1f.c63ac830 openshift-etcd 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-etcd,Name:installer-1-master-0,UID:6bde080b-3820-463f-a27d-9fb9a7843d5d,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:StaticPodInstallerCompleted,Message:Successfully installed revision 1,Source:EventSource{Component:static-pod-installer,Host:,},FirstTimestamp:2026-03-19 11:54:14.747331871 +0000 UTC m=+31.494481671,LastTimestamp:2026-03-19 11:54:14.747331871 +0000 UTC m=+31.494481671,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,}: the server was unable to return a response in the time allotted, but may still be processing the request (post events) config/pod/openshift-oauth-apiserver/logs/apiserver-899bc59d8-xxr9r/oauth-apiserver_current.log0000640000000000000000000011372115156762350031310 0ustar00000000000000002026-03-19T11:56:19.180478231Z E0319 11:56:19.180432 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:19.180602584Z E0319 11:56:19.180575 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:37.411514141Z W0319 11:56:37.411421 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:38.412665972Z W0319 11:56:38.412583 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:39.498624521Z E0319 11:56:39.497414 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:39.498624521Z E0319 11:56:39.497962 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:39.498624521Z E0319 11:56:39.498147 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:39.498624521Z E0319 11:56:39.498297 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:39.498624521Z E0319 11:56:39.498473 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:39.514345866Z E0319 11:56:39.514199 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:39.514345866Z E0319 11:56:39.514218 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:39.514609073Z E0319 11:56:39.514404 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:39.514658284Z E0319 11:56:39.514637 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:39.514872540Z E0319 11:56:39.514841 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:39.893472908Z W0319 11:56:39.893365 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:42.025855350Z W0319 11:56:42.025777 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:46.276923518Z W0319 11:56:46.276794 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:49.170541777Z E0319 11:56:49.170450 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:49.170541777Z E0319 11:56:49.170503 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:49.170896806Z E0319 11:56:49.170870 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:49.171021590Z E0319 11:56:49.170982 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:49.171246667Z E0319 11:56:49.171108 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:49.191400930Z E0319 11:56:49.189961 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:49.191400930Z E0319 11:56:49.190005 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:49.191400930Z E0319 11:56:49.190087 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:49.191400930Z E0319 11:56:49.190106 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:49.191400930Z E0319 11:56:49.190004 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:09.499457250Z E0319 11:57:09.499363 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:09.499457250Z E0319 11:57:09.499422 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:09.499527852Z E0319 11:57:09.499482 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:09.499527852Z E0319 11:57:09.499499 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:09.499552283Z E0319 11:57:09.499370 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:09.530097387Z E0319 11:57:09.529108 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:09.530097387Z E0319 11:57:09.529145 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:09.530097387Z E0319 11:57:09.529188 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:09.530097387Z E0319 11:57:09.529503 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:09.530097387Z E0319 11:57:09.529518 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:09.595410351Z E0319 11:57:09.595318 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:09.600578431Z E0319 11:57:09.600524 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:09.636884559Z E0319 11:57:09.636816 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:09.641969897Z E0319 11:57:09.641926 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:19.174013672Z E0319 11:57:19.173927 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:19.174146695Z E0319 11:57:19.174113 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:19.174443843Z E0319 11:57:19.174411 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:19.174602197Z E0319 11:57:19.174575 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:19.174800853Z E0319 11:57:19.174776 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:19.198920914Z E0319 11:57:19.198831 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:19.199053448Z E0319 11:57:19.199006 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:19.199129410Z E0319 11:57:19.199100 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:19.199303704Z E0319 11:57:19.199006 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:19.199387696Z E0319 11:57:19.199353 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:39.507950371Z E0319 11:57:39.506415 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:39.507950371Z E0319 11:57:39.506451 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:39.507950371Z E0319 11:57:39.506462 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:39.507950371Z E0319 11:57:39.506797 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:39.517426801Z E0319 11:57:39.517333 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:39.520792983Z E0319 11:57:39.517661 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:39.520792983Z E0319 11:57:39.517870 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:39.520792983Z E0319 11:57:39.518037 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:39.520792983Z E0319 11:57:39.518217 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:39.520792983Z E0319 11:57:39.518388 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:49.177446913Z E0319 11:57:49.177344 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:49.177532475Z E0319 11:57:49.177345 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:49.177572976Z E0319 11:57:49.177345 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:49.177692808Z E0319 11:57:49.177344 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:49.177841952Z E0319 11:57:49.177798 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:49.208105987Z E0319 11:57:49.207997 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:49.208105987Z E0319 11:57:49.208050 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:49.208179289Z E0319 11:57:49.208100 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:49.208179289Z E0319 11:57:49.208110 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:49.208597609Z E0319 11:57:49.208489 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:59.490873639Z I0319 11:57:59.490792 1 policy_source.go:224] refreshing policies 2026-03-19T11:58:09.506405471Z E0319 11:58:09.504840 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.506405471Z E0319 11:58:09.504851 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.506405471Z E0319 11:58:09.505025 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.506405471Z E0319 11:58:09.505293 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.506405471Z E0319 11:58:09.505395 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.517152203Z E0319 11:58:09.517068 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.518430354Z E0319 11:58:09.517468 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.518430354Z E0319 11:58:09.517499 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.518430354Z E0319 11:58:09.517634 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.518430354Z E0319 11:58:09.517902 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.605046667Z E0319 11:58:09.604979 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.611756569Z E0319 11:58:09.611707 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.633541269Z E0319 11:58:09.633475 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:09.639259857Z E0319 11:58:09.639226 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:17.518000337Z I0319 11:58:17.515282 1 policy_source.go:224] refreshing policies 2026-03-19T11:58:17.530773657Z I0319 11:58:17.529372 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-19T11:58:17.532877518Z I0319 11:58:17.531190 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:58:18.538084486Z I0319 11:58:18.537998 1 policy_source.go:224] refreshing policies 2026-03-19T11:58:19.189781660Z E0319 11:58:19.189685 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.189836232Z E0319 11:58:19.189769 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.190291392Z E0319 11:58:19.190200 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.190330233Z E0319 11:58:19.190287 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.190382644Z E0319 11:58:19.190349 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.218829846Z E0319 11:58:19.218095 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.218829846Z E0319 11:58:19.218147 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.218829846Z E0319 11:58:19.218466 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.220113467Z E0319 11:58:19.220046 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" 2026-03-19T11:58:19.220169588Z E0319 11:58:19.220143 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=266503107328201306, SKID=DC:D4:FB:77:9C:79:A1:4E:9A:C3:32:96:20:DC:F0:04:2D:82:89:B0, AKID=E1:FC:7B:29:01:69:8A:45:16:9C:B1:65:2D:DB:C3:B7:E9:9E:70:58 failed: x509: certificate signed by unknown authority]" config/pod/openshift-ingress/router-default-7dcf5569b5-kpmgt.json0000640000000000000000000001534115156762350023332 0ustar0000000000000000{"metadata":{"name":"router-default-7dcf5569b5-kpmgt","generateName":"router-default-7dcf5569b5-","namespace":"openshift-ingress","uid":"e2ad29ad-70ef-43c6-91f6-02f04d145673","resourceVersion":"6580","creationTimestamp":"2026-03-19T11:53:44Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"677444c44b","pod-template-hash":"7dcf5569b5"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-7dcf5569b5","uid":"5395d44d-3fc8-46c6-8850-9867d8ea60f5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-trcb7","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-trcb7","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["677444c44b"]}]}}]},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:44Z","reason":"Unschedulable","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000016603415156762350037364 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5885bfd7f4-gqd942026-03-19T11:57:22.572345721Z W0319 11:57:22.572337 1 dynamic_operator_client.go:355] .status.conditions["APIServerDeploymentProgressing"].message is missing; this will eventually be fatal 2026-03-19T11:57:22.572374472Z W0319 11:57:22.572366 1 dynamic_operator_client.go:352] .status.conditions["APIServerWorkloadDegraded"].reason is missing; this will eventually be fatal 2026-03-19T11:57:22.572396433Z W0319 11:57:22.572387 1 dynamic_operator_client.go:355] .status.conditions["APIServerWorkloadDegraded"].message is missing; this will eventually be fatal 2026-03-19T11:57:22.625994049Z I0319 11:57:22.625921 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-19T11:56:55Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError::WebhookAuthenticatorController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-03-19T11:57:22Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-03-19T11:53:06Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-19T11:53:06Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-19T11:53:05Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-19T11:57:22.636754390Z E0319 11:57:22.635851 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-19T11:57:22.641564400Z I0319 11:57:22.640341 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\nAPIServerWorkloadDegraded: \"deployments\": invalid dependency reference: \"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\"\nAPIServerWorkloadDegraded: \nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)" to "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)",Progressing changed from True to False ("AuthenticatorCertKeyProgressing: All is well"),Available message changed from "APIServerDeploymentAvailable: deployment/openshift-oauth-apiserver: could not be retrieved\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)." to "APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)." 2026-03-19T11:57:22.660140811Z E0319 11:57:22.659921 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused" 2026-03-19T11:57:23.736417070Z I0319 11:57:23.736355 1 request.go:700] Waited for 1.038392155s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication/endpoints/oauth-openshift 2026-03-19T11:57:24.700630383Z W0319 11:57:24.700567 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-03-19T11:57:24.700672284Z E0319 11:57:24.700622 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-03-19T11:57:26.127886325Z E0319 11:57:26.127810 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-19T11:57:26.127886325Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-19T11:57:26.127886325Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-19T11:57:26.127886325Z > 2026-03-19T11:57:26.503318108Z E0319 11:57:26.502485 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-19T11:57:26.503318108Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-19T11:57:26.503318108Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-19T11:57:26.503318108Z > 2026-03-19T11:57:29.557227972Z E0319 11:57:29.557160 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver), \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)]" 2026-03-19T11:57:29.560466110Z E0319 11:57:29.560410 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-19T11:57:29.562136741Z I0319 11:57:29.560969 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-19T11:56:55Z","message":"APIServerStaticResourcesDegraded: \"oauth-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\nAPIServerStaticResourcesDegraded: \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\nAPIServerStaticResourcesDegraded: \nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)","reason":"APIServerStaticResources_SyncError::IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError::WebhookAuthenticatorController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-03-19T11:57:22Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-03-19T11:53:06Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-19T11:53:06Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-19T11:53:05Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-19T11:57:29.567113592Z E0319 11:57:29.567032 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused" 2026-03-19T11:57:29.594974549Z I0319 11:57:29.594889 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)" to "APIServerStaticResourcesDegraded: \"oauth-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\nAPIServerStaticResourcesDegraded: \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\nAPIServerStaticResourcesDegraded: \nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)" 2026-03-19T11:57:29.595938691Z I0319 11:57:29.595890 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-19T11:56:55Z","message":"APIServerStaticResourcesDegraded: \"oauth-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\nAPIServerStaticResourcesDegraded: \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\nAPIServerStaticResourcesDegraded: \nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)","reason":"APIServerStaticResources_SyncError::IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError::WebhookAuthenticatorController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-03-19T11:57:22Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-03-19T11:53:06Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-19T11:53:06Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-19T11:53:05Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-19T11:57:29.603761382Z E0319 11:57:29.603510 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-19T11:57:32.319962355Z I0319 11:57:32.319810 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/webhook-authentication-integrated-oauth -n openshift-config because it was missing 2026-03-19T11:57:32.335200065Z W0319 11:57:32.335080 1 warnings.go:70] unknown field "status.oidcClients" 2026-03-19T11:57:32.337140562Z W0319 11:57:32.337066 1 dynamic_operator_client.go:355] .status.conditions["WebhookAuthenticatorControllerDegraded"].message is missing; this will eventually be fatal 2026-03-19T11:57:32.366153157Z E0319 11:57:32.366002 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-19T11:57:32.368603496Z E0319 11:57:32.368541 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused" 2026-03-19T11:57:32.372202403Z I0319 11:57:32.372137 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-19T11:56:55Z","message":"APIServerStaticResourcesDegraded: \"oauth-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\nAPIServerStaticResourcesDegraded: \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\nAPIServerStaticResourcesDegraded: \nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"APIServerStaticResources_SyncError::IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-03-19T11:57:22Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-03-19T11:53:06Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-19T11:53:06Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-19T11:53:05Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-19T11:57:32.384816360Z I0319 11:57:32.384762 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "APIServerStaticResourcesDegraded: \"oauth-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\nAPIServerStaticResourcesDegraded: \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\nAPIServerStaticResourcesDegraded: \nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)" to "APIServerStaticResourcesDegraded: \"oauth-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\nAPIServerStaticResourcesDegraded: \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\nAPIServerStaticResourcesDegraded: \nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready" 2026-03-19T11:57:33.652557423Z E0319 11:57:33.650883 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication), \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)]" 2026-03-19T11:57:33.652893961Z E0319 11:57:33.652871 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-19T11:57:33.684850737Z I0319 11:57:33.684779 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-19T11:56:55Z","message":"APIServerStaticResourcesDegraded: \"oauth-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\nAPIServerStaticResourcesDegraded: \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\nAPIServerStaticResourcesDegraded: \nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\nOpenshiftAuthenticationStaticResourcesDegraded: ","reason":"APIServerStaticResources_SyncError::IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError::OpenshiftAuthenticationStaticResources_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-03-19T11:57:22Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-03-19T11:53:06Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-19T11:53:06Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-19T11:53:05Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-19T11:57:33.705692723Z I0319 11:57:33.705607 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "APIServerStaticResourcesDegraded: \"oauth-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\nAPIServerStaticResourcesDegraded: \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\nAPIServerStaticResourcesDegraded: \nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready" to "APIServerStaticResourcesDegraded: \"oauth-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\nAPIServerStaticResourcesDegraded: \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\nAPIServerStaticResourcesDegraded: \nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\nOpenshiftAuthenticationStaticResourcesDegraded: " 2026-03-19T11:57:33.710602962Z E0319 11:57:33.709924 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused" 2026-03-19T11:57:35.886750792Z W0319 11:57:35.885903 1 dynamic_operator_client.go:355] .status.conditions["APIServerStaticResourcesDegraded"].message is missing; this will eventually be fatal 2026-03-19T11:57:35.925455232Z I0319 11:57:35.925380 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-19T11:56:55Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\nOpenshiftAuthenticationStaticResourcesDegraded: ","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError::OpenshiftAuthenticationStaticResources_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-03-19T11:57:22Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-03-19T11:53:06Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-19T11:53:06Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-19T11:53:05Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-19T11:57:35.939080003Z E0319 11:57:35.939021 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-19T11:57:35.940445016Z E0319 11:57:35.940420 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused" 2026-03-19T11:57:35.947041426Z I0319 11:57:35.946354 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "APIServerStaticResourcesDegraded: \"oauth-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\nAPIServerStaticResourcesDegraded: \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\nAPIServerStaticResourcesDegraded: \nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\nOpenshiftAuthenticationStaticResourcesDegraded: " to "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\nOpenshiftAuthenticationStaticResourcesDegraded: " 2026-03-19T11:57:36.127186970Z E0319 11:57:36.127102 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-19T11:57:36.127186970Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-19T11:57:36.127186970Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-19T11:57:36.127186970Z > 2026-03-19T11:57:37.107221507Z I0319 11:57:37.107137 1 request.go:700] Waited for 1.158792668s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver/secrets/etcd-client 2026-03-19T11:57:37.909769574Z W0319 11:57:37.909679 1 dynamic_operator_client.go:355] .status.conditions["OpenshiftAuthenticationStaticResourcesDegraded"].message is missing; this will eventually be fatal 2026-03-19T11:57:38.203030375Z I0319 11:57:38.202966 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-19T11:56:55Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-03-19T11:57:22Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-03-19T11:53:06Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-19T11:53:06Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-19T11:53:05Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-19T11:57:38.207019393Z E0319 11:57:38.206812 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-19T11:57:38.214441592Z E0319 11:57:38.214391 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused" 2026-03-19T11:57:38.222846996Z I0319 11:57:38.222697 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\nOpenshiftAuthenticationStaticResourcesDegraded: " to "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready" 2026-03-19T11:57:39.307060033Z I0319 11:57:39.306975 1 request.go:700] Waited for 1.084251428s due to client-side throttling, not priority and fairness, request: POST:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication-operator/events 2026-03-19T11:57:40.538364281Z E0319 11:57:40.538064 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-19T11:57:40.538364281Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-19T11:57:40.538364281Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-19T11:57:40.538364281Z > 2026-03-19T11:57:40.549318308Z E0319 11:57:40.549237 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-19T11:57:40.549318308Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-19T11:57:40.549318308Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-19T11:57:40.549318308Z > 2026-03-19T11:57:46.128012147Z E0319 11:57:46.127926 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-19T11:57:46.128012147Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-19T11:57:46.128012147Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-19T11:57:46.128012147Z > 2026-03-19T11:57:48.316201900Z E0319 11:57:48.316153 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-19T11:57:48.316201900Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-19T11:57:48.316201900Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-19T11:57:48.316201900Z > 2026-03-19T11:57:50.561487229Z E0319 11:57:50.561423 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-19T11:57:50.561487229Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-19T11:57:50.561487229Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-19T11:57:50.561487229Z > 2026-03-19T11:57:52.651537549Z E0319 11:57:52.651432 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused" 2026-03-19T11:57:56.429772132Z E0319 11:57:56.429689 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-19T11:57:56.429772132Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-19T11:57:56.429772132Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-19T11:57:56.429772132Z > 2026-03-19T11:57:56.939196741Z E0319 11:57:56.939142 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-19T11:57:56.939196741Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-19T11:57:56.939196741Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-19T11:57:56.939196741Z > 2026-03-19T11:57:58.565941580Z W0319 11:57:58.565857 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-03-19T11:57:58.565941580Z E0319 11:57:58.565914 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-03-19T11:58:06.131780881Z E0319 11:58:06.131213 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-19T11:58:06.131780881Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-19T11:58:06.131780881Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-19T11:58:06.131780881Z > 2026-03-19T11:58:06.833710924Z W0319 11:58:06.831834 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-19T11:58:06.833710924Z E0319 11:58:06.831895 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-03-19T11:58:16.134005621Z E0319 11:58:16.133916 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-19T11:58:16.134005621Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-19T11:58:16.134005621Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-19T11:58:16.134005621Z > 2026-03-19T11:58:19.057274282Z W0319 11:58:19.057209 1 dynamic_operator_client.go:352] .status.conditions["ReadyIngressNodesAvailable"].reason is missing; this will eventually be fatal 2026-03-19T11:58:19.057274282Z W0319 11:58:19.057237 1 dynamic_operator_client.go:355] .status.conditions["ReadyIngressNodesAvailable"].message is missing; this will eventually be fatal 2026-03-19T11:58:19.095086231Z I0319 11:58:19.091230 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-19T11:56:55Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-03-19T11:57:22Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-03-19T11:53:06Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-19T11:53:06Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-19T11:53:05Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-19T11:58:19.111840837Z E0319 11:58:19.111767 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused" 2026-03-19T11:58:19.112041843Z E0319 11:58:19.111996 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-19T11:58:19.119966025Z I0319 11:58:19.119826 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)." to "APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found" authentication-operator_previous.log0000640000000000000000000004064415156762350037554 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5885bfd7f4-gqd942026-03-19T11:54:10.255853065Z I0319 11:54:10.255431 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionMigration ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255435 1 base_controller.go:181] Shutting down WebhookAuthenticatorCertApprover_OpenShiftAuthenticator ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255442 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionKey ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255445 1 base_controller.go:181] Shutting down openshift-authentication-UnsupportedConfigOverrides ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255456 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionCondition ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255457 1 base_controller.go:181] Shutting down OAuthServerServiceEndpointsEndpointAccessibleController ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255474 1 base_controller.go:181] Shutting down openshift-authentication-IngressNodesAvailable ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255494 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255508 1 base_controller.go:181] Shutting down NamespaceFinalizerController_openshift-oauth-apiserver ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255510 1 base_controller.go:181] Shutting down oauth-server ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255525 1 base_controller.go:181] Shutting down OAuthAPIServerController-WorkloadWorkloadController ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255573 1 base_controller.go:123] Shutting down worker of openshift-authentication-ServiceCA controller ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255582 1 base_controller.go:113] All openshift-authentication-ServiceCA workers have been terminated 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255592 1 base_controller.go:123] Shutting down worker of StatusSyncer_authentication controller ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255597 1 base_controller.go:113] All StatusSyncer_authentication workers have been terminated 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255606 1 base_controller.go:123] Shutting down worker of openshift-authentication-RemoveStaleConditions controller ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255612 1 base_controller.go:113] All openshift-authentication-RemoveStaleConditions workers have been terminated 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255621 1 base_controller.go:123] Shutting down worker of authentication-ManagementState controller ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255624 1 base_controller.go:113] All authentication-ManagementState workers have been terminated 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255632 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255636 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255641 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorCertApprover_OpenShiftAuthenticator controller ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255646 1 base_controller.go:113] All WebhookAuthenticatorCertApprover_OpenShiftAuthenticator workers have been terminated 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255657 1 base_controller.go:123] Shutting down worker of openshift-authentication-UnsupportedConfigOverrides controller ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255663 1 base_controller.go:113] All openshift-authentication-UnsupportedConfigOverrides workers have been terminated 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255669 1 base_controller.go:123] Shutting down worker of OAuthServerServiceEndpointsEndpointAccessibleController controller ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255674 1 base_controller.go:113] All OAuthServerServiceEndpointsEndpointAccessibleController workers have been terminated 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255681 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-oauth-apiserver controller ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255685 1 base_controller.go:113] All NamespaceFinalizerController_openshift-oauth-apiserver workers have been terminated 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255809 1 base_controller.go:181] Shutting down SecretRevisionPruneController ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255822 1 base_controller.go:181] Shutting down WebhookAuthenticatorController ... 2026-03-19T11:54:10.255853065Z I0319 11:54:10.255832 1 base_controller.go:181] Shutting down OpenShiftAuthenticatorCertRequester ... 2026-03-19T11:54:10.255952747Z E0319 11:54:10.255868 1 base_controller.go:277] "Unhandled Error" err="\"OpenShiftAuthenticatorCertRequester\" controller failed to sync \"system:openshift:openshift-monitoring-t74rl\", err: unable to get secret \"openshift-oauth-apiserver/openshift-authenticator-certs\": client rate limiter Wait returned an error: context canceled" 2026-03-19T11:54:10.255952747Z I0319 11:54:10.255881 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-19T11:54:10.255952747Z I0319 11:54:10.255900 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-19T11:54:10.255952747Z I0319 11:54:10.255915 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2026-03-19T11:54:10.255952747Z I0319 11:54:10.255928 1 base_controller.go:123] Shutting down worker of RouterCertsDomainValidationController controller ... 2026-03-19T11:54:10.255952747Z I0319 11:54:10.255943 1 base_controller.go:181] Shutting down TrustDistributionController ... 2026-03-19T11:54:10.255952747Z I0319 11:54:10.255945 1 base_controller.go:113] All RouterCertsDomainValidationController workers have been terminated 2026-03-19T11:54:10.255973348Z I0319 11:54:10.255965 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-19T11:54:10.256015259Z I0319 11:54:10.255983 1 genericapiserver.go:640] [graceful-termination] in-flight non long-running request(s) have drained 2026-03-19T11:54:10.256015259Z I0319 11:54:10.256003 1 genericapiserver.go:681] "[graceful-termination] shutdown event" name="InFlightRequestsDrained" 2026-03-19T11:54:10.256041169Z I0319 11:54:10.256028 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-19T11:54:10.256129091Z I0319 11:54:10.256101 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-19T11:54:10.256129091Z I0319 11:54:10.256119 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-19T11:54:10.256140221Z I0319 11:54:10.256132 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-19T11:54:10.256156692Z I0319 11:54:10.255932 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-19T11:54:10.256453958Z I0319 11:54:10.256401 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-03-19T11:54:10.256453958Z I0319 11:54:10.256420 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-03-19T11:54:10.256531241Z I0319 11:54:10.256501 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-03-19T11:54:10.256531241Z I0319 11:54:10.256512 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-03-19T11:54:10.256531241Z I0319 11:54:10.256522 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorController controller ... 2026-03-19T11:54:10.256531241Z I0319 11:54:10.256526 1 base_controller.go:113] All WebhookAuthenticatorController workers have been terminated 2026-03-19T11:54:10.256544011Z I0319 11:54:10.256536 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-19T11:54:10.256544011Z I0319 11:54:10.256540 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-19T11:54:10.256551761Z I0319 11:54:10.256547 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-19T11:54:10.256558991Z I0319 11:54:10.256552 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-19T11:54:10.256566192Z I0319 11:54:10.256561 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-03-19T11:54:10.256579022Z I0319 11:54:10.256567 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-03-19T11:54:10.256586242Z I0319 11:54:10.256577 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-19T11:54:10.256593372Z I0319 11:54:10.256585 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-19T11:54:10.256736855Z E0319 11:54:10.256697 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert\": context canceled" 2026-03-19T11:54:10.256960200Z I0319 11:54:10.256908 1 base_controller.go:123] Shutting down worker of OpenShiftAuthenticatorCertRequester controller ... 2026-03-19T11:54:10.256960200Z I0319 11:54:10.256927 1 base_controller.go:113] All OpenShiftAuthenticatorCertRequester workers have been terminated 2026-03-19T11:54:10.256960200Z I0319 11:54:10.256935 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:54:10.257022822Z I0319 11:54:10.256998 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:54:10.257038032Z I0319 11:54:10.257026 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-19T11:54:10.257083573Z I0319 11:54:10.257056 1 base_controller.go:123] Shutting down worker of openshift-authentication-IngressNodesAvailable controller ... 2026-03-19T11:54:10.257094943Z I0319 11:54:10.257081 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionPrune controller ... 2026-03-19T11:54:10.257094943Z I0319 11:54:10.257090 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionCondition controller ... 2026-03-19T11:54:10.257103963Z I0319 11:54:10.257094 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionPrune workers have been terminated 2026-03-19T11:54:10.257103963Z I0319 11:54:10.257098 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionCondition workers have been terminated 2026-03-19T11:54:10.257114224Z I0319 11:54:10.257108 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionState controller ... 2026-03-19T11:54:10.257122324Z I0319 11:54:10.257118 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionState workers have been terminated 2026-03-19T11:54:10.257130994Z I0319 11:54:10.257123 1 base_controller.go:123] Shutting down worker of openshift-authentication-IngressState controller ... 2026-03-19T11:54:10.257130994Z I0319 11:54:10.257127 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionMigration controller ... 2026-03-19T11:54:10.257139534Z I0319 11:54:10.257130 1 base_controller.go:113] All openshift-authentication-IngressState workers have been terminated 2026-03-19T11:54:10.257139534Z I0319 11:54:10.257135 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionMigration workers have been terminated 2026-03-19T11:54:10.257148534Z I0319 11:54:10.257142 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-2552542543/tls.crt::/tmp/serving-cert-2552542543/tls.key" 2026-03-19T11:54:10.257148534Z I0319 11:54:10.257144 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionKey controller ... 2026-03-19T11:54:10.257162025Z I0319 11:54:10.257154 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionKey workers have been terminated 2026-03-19T11:54:10.257162025Z I0319 11:54:10.257084 1 base_controller.go:113] All openshift-authentication-IngressNodesAvailable workers have been terminated 2026-03-19T11:54:10.257171205Z I0319 11:54:10.257164 1 base_controller.go:123] Shutting down worker of oauth-server controller ... 2026-03-19T11:54:10.257179755Z I0319 11:54:10.257169 1 base_controller.go:113] All oauth-server workers have been terminated 2026-03-19T11:54:10.257179755Z I0319 11:54:10.257172 1 base_controller.go:123] Shutting down worker of OAuthServerServiceEndpointAccessibleController controller ... 2026-03-19T11:54:10.257188845Z I0319 11:54:10.257178 1 base_controller.go:113] All OAuthServerServiceEndpointAccessibleController workers have been terminated 2026-03-19T11:54:10.257188845Z I0319 11:54:10.257180 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-19T11:54:10.257197625Z I0319 11:54:10.257187 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-19T11:54:10.258232479Z I0319 11:54:10.257882 1 base_controller.go:123] Shutting down worker of TrustDistributionController controller ... 2026-03-19T11:54:10.258232479Z I0319 11:54:10.257897 1 base_controller.go:113] All TrustDistributionController workers have been terminated 2026-03-19T11:54:10.259414936Z E0319 11:54:10.259372 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": client rate limiter Wait returned an error: context canceled" 2026-03-19T11:54:10.260570641Z I0319 11:54:10.260527 1 base_controller.go:123] Shutting down worker of OAuthAPIServerController-WorkloadWorkloadController controller ... 2026-03-19T11:54:10.260570641Z I0319 11:54:10.260550 1 base_controller.go:113] All OAuthAPIServerController-WorkloadWorkloadController workers have been terminated 2026-03-19T11:54:10.265385110Z I0319 11:54:10.252707 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-19T11:54:10.265385110Z I0319 11:54:10.265376 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-19T11:54:10.265403140Z I0319 11:54:10.265386 1 builder.go:335] server exited 2026-03-19T11:54:10.319272881Z E0319 11:54:10.319208 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/ns.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/serviceaccount.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/oauth-service.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/trust_distribution_role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:54:10.320762194Z I0319 11:54:10.320701 1 base_controller.go:123] Shutting down worker of OpenshiftAuthenticationStaticResources-StaticResources controller ... 2026-03-19T11:54:10.320799195Z I0319 11:54:10.320766 1 base_controller.go:113] All OpenshiftAuthenticationStaticResources-StaticResources workers have been terminated 2026-03-19T11:54:10.408241232Z W0319 11:54:10.407137 1 leaderelection.go:84] leader election lost config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-gqd94.json0000640000000000000000000001610315156762350030244 0ustar0000000000000000{"metadata":{"name":"authentication-operator-5885bfd7f4-gqd94","generateName":"authentication-operator-5885bfd7f4-","namespace":"openshift-authentication-operator","uid":"732989c5-1b89-46f0-9917-b68613f7f005","resourceVersion":"8920","creationTimestamp":"2026-03-19T11:51:31Z","labels":{"app":"authentication-operator","pod-template-hash":"5885bfd7f4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.10/23\"],\"mac_address\":\"0a:58:0a:80:00:0a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.10/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.10\"\n ],\n \"mac\": \"0a:58:0a:80:00:0a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-5885bfd7f4","uid":"c56a1c0a-6e31-4bd7-8347-9e6b3abe5614","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-bfvz6","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3fdcbf7be3f90bd080ffb2c75b091d7eef03681e0f90912ff6140ee48c177616"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.35_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-bfvz6","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c9"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:49Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:13Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:13Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:49Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.10","podIPs":[{"ip":"10.128.0.10"}],"startTime":"2026-03-19T11:52:49Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-03-19T11:54:12Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-19T11:53:04Z","finishedAt":"2026-03-19T11:54:10Z","containerID":"cri-o://4ee16bcaa03f25cf971556786ccb51f285719b794843e45ad52bd8134e676a54"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","containerID":"cri-o://23db8a325d8ebadb5b1d1bab4b4a614762b90313ccb3adc271c971443cebddcd","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-bfvz6","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000003056215156762350020654 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:47:49Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:47:59Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-7b95f86987 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:48:02Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-7b95f86987-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:48:02Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-5c9796789 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:48:02Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-68f85b4d6c to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:48:03Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5c9796789-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:48:03Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-68f85b4d6c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:51:25Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:51:28Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-7b95f86987-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:51:28Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-68f85b4d6c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:51:28Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5c9796789-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:51:30Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-7b95f86987-jq5vq","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:51:30Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-5c9796789-l9sw9","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:51:30Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-68f85b4d6c-n5gr9","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:52:53Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:52:53Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:52:53Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:53:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:53:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:53:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:02Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:02Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.11/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:02Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:02Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:02Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:02Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.8/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:02Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:02Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.7/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:12Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:12Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 10.094s (10.094s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:12Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.8:8443/healthz\": dial tcp 10.128.0.8:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:12Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.11:8443/healthz\": dial tcp 10.128.0.11:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:12Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 9.697s (9.697s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:12Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:12Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.11:8443/healthz\": dial tcp 10.128.0.11:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:12Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:12Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:12Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.8:8443/healthz\": dial tcp 10.128.0.8:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:12Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:12Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 9.853s (9.853s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:12Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:13Z","reason":"NoOperatorGroup","message":"csv in namespace with no operatorgroups","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:13Z","reason":"LeaderElection","message":"package-server-manager-7b95f86987-jq5vq_c97f0069-6ed9-43ea-9c76-ee0bad6990d8 became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:57:33Z","reason":"RequirementsUnknown","message":"InstallModes now support target namespaces","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:57:34Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:57:40Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:57:41Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:57:50Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:57:50Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-bbf67c86c-n58nq","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:57:50Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-bbf67c86c to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:57:55Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:57:55Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:57:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:57:55Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.67/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001215315156762350015450 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:29Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-5848f5856-st8kj","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:29Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-5848f5856 to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:30Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : secret \"etcd-client\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:33Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:34Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-5848f5856 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:36Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-f67f6868b-chx8j","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:36Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-5848f5856-st8kj","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:36Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-f67f6868b to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:37Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:41Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.39/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:42Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:49Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\" in 7.507s (7.507s including waiting). Image size: 589386806 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:50Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:50Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:50Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:50Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:50Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:50Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:50Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:50Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[-]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa failed: reason withheld\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:53:54Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000010236515156762350017306 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:47:47Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-d65958b8 to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:47:58Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-d65958b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:51:29Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-d65958b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:51:31Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-d65958b8-6hsqn","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:52:50Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.21/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:52:50Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:01Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:01Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:15Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:16Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\" in 846ms (846ms including waiting). Image size: 512274055 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:17Z","reason":"LeaderElection","message":"openshift-apiserver-operator-d65958b8-6hsqn_3c25faa9-ebba-4884-8ab3-2c17132f9403 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:17Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:17Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to False (\"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \",Available changed from Unknown to False (\"\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n  }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:20Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:22Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:22Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:22Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:23Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:25Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:26Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:29Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"All is well\",Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:30Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:32Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.35\"}] to [{\"operator\" \"4.18.35\"} {\"openshift-apiserver\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:56:27Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:56:28Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:56:28Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000007136515156762350020215 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:47:46Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-dddff6458 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:47:57Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-dddff6458-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:51:29Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-dddff6458-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:51:32Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-dddff6458-4wj9n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:52:50Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.25/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:52:51Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:52:59Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:52:59Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\": pull QPS exceeded","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:14Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:15Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" in 692ms (692ms including waiting). Image size: 506395599 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:16Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-dddff6458-4wj9n_bd052107-ed1e-44bb-afc6-f8d9dbd7debf became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:16Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:16Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:16Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:16Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:16Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:16Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:16Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:17Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:20Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:21Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:22Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:22Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:23Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:24Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:24Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:29Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:29Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:29Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:30Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:30Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:30Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:31Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:34Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:38Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:38Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:44Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:55Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:55Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:56Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:01Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:55:53Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:55:54Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:55:54Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000000516015156762350016352 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:53:41Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.38/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:53:42Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:53:43Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:53:43Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:53:44Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:53:44Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.42/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:53:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:53:45Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:53:45Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:53:59Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:02Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.48/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:03Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:03Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000012300715156762350022021 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:47:47Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-ff989d6cc to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:47:57Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-ff989d6cc-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:51:29Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-ff989d6cc-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:51:32Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-ff989d6cc-5gvgh","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:52:50Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.20/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:52:50Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:04Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:04Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:14Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:16Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" in 1.848s (1.848s including waiting). Image size: 508888171 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"All is well\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from Unknown to False (\"All is well\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"LeaderElection","message":"kube-controller-manager-operator-ff989d6cc-5gvgh_d6716a6e-ec86-4a6d-b1d1-77b1cf120969 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-kxppc\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:20Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:22Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:22Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:22Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:23Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:23Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:23Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:24Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:24Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:24Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n  \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-kxppc\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n  \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n  \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:29Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:31Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:31Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:32Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:34Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:35Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:35Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:39Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:39Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:43Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:46Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed,required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:57Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:04Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:05Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:06Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: no such host\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: no such host\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:08Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed,required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:13Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:56:27Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:56:28Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:56:28Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000000174315156762350020172 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-19T11:53:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.47/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-19T11:53:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-19T11:53:58Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-19T11:53:58Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-19T11:54:12Z","reason":"Killing","message":"Stopping container installer","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000472415156762350016401 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-19T11:53:51Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.45/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-19T11:53:52Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-19T11:53:52Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-19T11:53:52Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-19T11:57:30Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.54/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-19T11:57:30Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-19T11:57:30Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-19T11:57:30Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-19T11:57:57Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-19T11:58:13Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.68/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-19T11:58:13Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-19T11:58:14Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-19T11:58:14Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000034210115156762350020224 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:48:02Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-8b68b9d9b to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:48:03Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-8b68b9d9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:51:30Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-8b68b9d9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:51:32Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-8b68b9d9b-pjc7h","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:50Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.19/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:51Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:51Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:52Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:52Z","reason":"LeaderElection","message":"kube-apiserver-operator-8b68b9d9b-pjc7h_e0bdf5bd-8435-46e1-b816-ccf411712f2f became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:52Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:52Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:52Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:52Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:53Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:53Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to False (\"NodeControllerDegraded: All master nodes are ready\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"),EvaluationConditionsDetected set to False (\"All is well\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:54Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:54Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:54Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:54Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:54Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:55Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:55Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:57Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:57Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:57Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:57Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:58Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:58Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:58Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:58Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:59Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:59Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:59Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:59Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:59Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:59Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:52:59Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:00Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:00Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:00Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:00Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:00Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:00Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:00Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:00Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:01Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:01Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:01Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:01Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:02Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:02Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:02Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:02Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:02Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:03Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:03Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:03Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:04Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:04Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:04Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:04Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:04Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:05Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:05Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:05Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:05Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:05Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:06Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:06Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:06Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:06Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:07Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:07Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:09Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:09Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:09Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:10Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:10Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:10Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:10Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:10Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:10Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:10Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:10Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:10Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:11Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:31Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:32Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:37Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-apiserver:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:38Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-apiserver-client-ca -n openshift-config-managed:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:40Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:42Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:42Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:44Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:44Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:47Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:12Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:13Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:13Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:13Z","reason":"LeaderElection","message":"kube-apiserver-operator-8b68b9d9b-pjc7h_4b158f56-b68d-42f6-a990-8e7dd885fb63 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:13Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:13Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nStaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-apiserver-master-0)\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nStaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-apiserver-master-0)\" to \"NodeControllerDegraded: All master nodes are ready\\nStaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-apiserver-master-0)\\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nStaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-apiserver-master-0)\\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\" to \"NodeControllerDegraded: All master nodes are ready\\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:12Z","reason":"InstallerPodFailed","message":"installer errors: installer: ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0\nI0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0319 11:53:54.251472 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0319 11:53:54.251484 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0\nF0319 11:54:38.509895 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251472 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.251484 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0319 11:54:38.509895 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251472 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.251484 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0319 11:54:38.509895 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251472 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.251484 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0319 11:54:38.509895 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251472 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.251484 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0319 11:54:38.509895 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \" to \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251472 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.251484 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0319 11:54:38.509895 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251472 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.251484 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0319 11:54:38.509895 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251472 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.251484 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0319 11:54:38.509895 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:29Z","reason":"PodCreated","message":"Created Pod/installer-1-retry-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251472 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.251484 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0319 11:54:38.509895 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \" to \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251472 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.251484 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0319 11:54:38.509895 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nKubeAPIServerStaticResourcesDegraded: \\\"assets/kube-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-apiserver)\\nKubeAPIServerStaticResourcesDegraded: \\\"assets/kube-apiserver/svc.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services apiserver)\\nKubeAPIServerStaticResourcesDegraded: \\\"assets/kube-apiserver/check-endpoints-clusterrole.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterroles.rbac.authorization.k8s.io system:openshift:controller:check-endpoints)\\nKubeAPIServerStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:32Z","reason":"ObserveWebhookTokenAuthenticator","message":"authentication-token webhook configuration status changed from false to true","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:32Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n \t\"admission\": map[string]any{\"pluginConfig\": map[string]any{\"PodSecurity\": map[string]any{\"configuration\": map[string]any{\"defaults\": map[string]any{\"audit\": string(\"restricted\"), \"audit-version\": string(\"latest\"), \"enforce\": string(\"privileged\"), \"enforce-version\": string(\"latest\"), ...}}}, \"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{\"allowIngressIP\": bool(false), \"apiVersion\": string(\"network.openshift.io/v1\"), \"kind\": string(\"ExternalIPRangerAdmissionConfig\")}}, \"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{\"apiVersion\": string(\"network.openshift.io/v1\"), \"kind\": string(\"RestrictedEndpointsAdmissionConfig\"), \"restrictedCIDRs\": []any{string(\"10.128.0.0/16\"), string(\"172.30.0.0/16\")}}}}},\n \t\"apiServerArguments\": map[string]any{\n \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"authentication-token-webhook-config-file\": []any{\n+ \t\t\tstring(\"/etc/kubernetes/static-pod-resources/secrets/webhook-authenticator/kubeConfig\"),\n+ \t\t},\n+ \t\t\"authentication-token-webhook-version\": []any{string(\"v1\")},\n \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n \t\t\"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n \t\t... // 6 identical entries\n \t},\n \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n \t\"gracefulTerminationDuration\": string(\"15\"),\n \t... // 2 identical entries\n }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:33Z","reason":"SecretCreated","message":"Created Secret/webhook-authenticator -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:33Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"optional secret/webhook-authenticator has been created\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251472 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.251484 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0319 11:54:38.509895 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nKubeAPIServerStaticResourcesDegraded: \\\"assets/kube-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-apiserver)\\nKubeAPIServerStaticResourcesDegraded: \\\"assets/kube-apiserver/svc.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services apiserver)\\nKubeAPIServerStaticResourcesDegraded: \\\"assets/kube-apiserver/check-endpoints-clusterrole.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterroles.rbac.authorization.k8s.io system:openshift:controller:check-endpoints)\\nKubeAPIServerStaticResourcesDegraded: \" to \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251472 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.251484 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0319 11:54:38.509895 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:42Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-apiserver:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:47Z","reason":"SecretCreated","message":"Created Secret/etcd-client-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:49Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:50Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:50Z","reason":"SecretCreated","message":"Created Secret/webhook-authenticator-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:51Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"optional secret/webhook-authenticator has been created\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:51Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/config has changed\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0319 11:53:53.251840 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0319 11:53:54.251472 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.251484 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0319 11:53:54.508444 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0319 11:54:24.508810 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0319 11:54:38.509895 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \" to \"NodeControllerDegraded: All master nodes are ready\",Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:57:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:58:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:58:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:58:02Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:58:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:58:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:58:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:58:08Z","reason":"SecretCreated","message":"Created Secret/etcd-client-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:58:11Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:58:11Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:58:13Z","reason":"SecretCreated","message":"Created Secret/webhook-authenticator-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:58:13Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/config has changed\"","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001260615156762350014372 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:53:42Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.40/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:53:42Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:53:43Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:53:43Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:14Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:27Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:28Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:28Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:42Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:43Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:57Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:57Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:56:40Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:56:41Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:56:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:56:41Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:56:41Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:56:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:56:41Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:56:41Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:56:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:56:41Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:56:41Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:56:41Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:56:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:56:41Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:56:41Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000003644315156762350016230 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:47:48Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-8544cbcf9c to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:47:59Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-8544cbcf9c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:51:29Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-8544cbcf9c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:51:31Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-8544cbcf9c-9w7hc","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:52:50Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.23/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:52:51Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:04Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:04Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:20Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" in 1.488s (1.488s including waiting). Image size: 518384969 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:21Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:21Z","reason":"LeaderElection","message":"etcd-operator-8544cbcf9c-9w7hc_d44a82dd-a0f2-4ace-aef4-e285aeb84fc4 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:21Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:21Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:22Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:22Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:23Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:23Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:23Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:24Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:24Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:24Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:25Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:25Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:26Z","reason":"ScriptControllerErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:28Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:28Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:28Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:30Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:32Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:54:57Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:54:57Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:55:53Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:55:54Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:55:54Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:57:07Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.23:8443/healthz\": net/http: TLS handshake timeout","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:57:07Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.23:8443/healthz\": net/http: TLS handshake timeout\nbody: \n","type":"Warning"}]}events/openshift-oauth-apiserver.json0000640000000000000000000001047615156762350016574 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:30Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : secret \"etcd-client\" not found","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:30Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-5547669f67 to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:30Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-5547669f67-9ltgx","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:32Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:37Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-5547669f67 to 0 from 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:37Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-899bc59d8 to 1 from 0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:37Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-5547669f67-9ltgx","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:37Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-899bc59d8-xxr9r","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:41Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.35/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:42Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:47.001016Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:49Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\" in 7.455s (7.455s including waiting). Image size: 505345991 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:50Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:50Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:53Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.46/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:55Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:55Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:56Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:56Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:53:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\" already present on machine","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000056015156762350015121 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-03-19T11:53:44Z","reason":"SuccessfulCreate","message":"Created pod: router-default-7dcf5569b5-kpmgt","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-19T11:53:44Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-7dcf5569b5 to 1","type":"Normal"}]}events/openshift-authentication-operator.json0000640000000000000000000035532215156762350020330 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:47:49Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-5885bfd7f4 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:47:59Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5885bfd7f4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:51:28Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5885bfd7f4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:51:31Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-5885bfd7f4-gqd94","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:52:50Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:52:50Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:52:59Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:04Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\" in 5.005s (5.005s including waiting). Image size: 513221333 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:05Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:05Z","reason":"LeaderElection","message":"authentication-operator-5885bfd7f4-gqd94_3292a16a-4a5f-4c87-a5e4-88d2d4c3d115 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"),Available changed from Unknown to False (\"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:07Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:07Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:07Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:07Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:07Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:07Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:07Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\\"oauthConfig\\\": map[string]any{\\n+ \\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+ \\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+ \\t\\t\\t\\\"templates\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+ \\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n+ \\t\\t\\\"serverArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+ \\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+ \\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+ \\t\\t},\\n+ \\t\\t\\\"servingInfo\\\": map[string]any{\\n+ \\t\\t\\t\\\"cipherSuites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:08Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:08Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \",Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:09Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:09Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:09Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:09Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:09Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+ \\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+ \\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:10Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:12Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:12Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-kxdbx\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:12Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-kxdbx\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:12Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:12Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:14Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:15Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:15Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:17Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:21Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:23Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:23Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:23Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:24Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:26Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:30Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:30Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:30Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:30Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:30Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:34Z","reason":"SecretCreateFailed","message":"Failed to create Secret/etcd-client -n openshift-oauth-apiserver: secrets \"etcd-client\" already exists","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nResourceSyncControllerDegraded: secrets \\\"etcd-client\\\" already exists\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nResourceSyncControllerDegraded: secrets \\\"etcd-client\\\" already exists\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Failed to get system serving cert secret \\\"v4-0-config-system-serving-cert\\\": secret \\\"v4-0-config-system-serving-cert\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Failed to get system serving cert secret \\\"v4-0-config-system-serving-cert\\\": secret \\\"v4-0-config-system-serving-cert\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:42Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any{\\n \\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n \\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n \\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n \\t\\\"servingInfo\\\": map[string]any{\\n \\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n \\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t\\\"namedCertificates\\\": []any{\\n+ \\t\\t\\tmap[string]any{\\n+ \\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n \\t},\\n \\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n }\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.35\"}] to [{\"operator\" \"4.18.35\"} {\"oauth-apiserver\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:12Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:12Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.10:8443/healthz\": dial tcp 10.128.0.10:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:12Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.10:8443/healthz\": dial tcp 10.128.0.10:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:12Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:12Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:13Z","reason":"LeaderElection","message":"authentication-operator-5885bfd7f4-gqd94_660bb7ad-081d-4130-a5cf-1fbcf9129863 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:57:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from False to True (\"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:57:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nRouterCertsDomainValidationControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets router-certs)\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps audit)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nRouterCertsDomainValidationControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets router-certs)\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:57:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps audit)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nRouterCertsDomainValidationControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets router-certs)\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps audit)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nRouterCertsDomainValidationControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets router-certs)\\nSystemServiceCAConfigDegraded: Unable to get or create system service CA config \\\"v4-0-config-system-service-ca\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps v4-0-config-system-service-ca)\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:57:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps audit)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nRouterCertsDomainValidationControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets router-certs)\\nSystemServiceCAConfigDegraded: Unable to get or create system service CA config \\\"v4-0-config-system-service-ca\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps v4-0-config-system-service-ca)\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps audit)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nRouterCertsDomainValidationControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets router-certs)\\nSystemServiceCAConfigDegraded: Unable to get or create system service CA config \\\"v4-0-config-system-service-ca\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps v4-0-config-system-service-ca)\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:57:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps audit)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nRouterCertsDomainValidationControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets router-certs)\\nSystemServiceCAConfigDegraded: Unable to get or create system service CA config \\\"v4-0-config-system-service-ca\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps v4-0-config-system-service-ca)\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps audit)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Unable to get or create system service CA config \\\"v4-0-config-system-service-ca\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps v4-0-config-system-service-ca)\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:57:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps audit)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Unable to get or create system service CA config \\\"v4-0-config-system-service-ca\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps v4-0-config-system-service-ca)\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps audit)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:57:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/openshift-oauth-apiserver: could not be retrieved\"),Available message changed from \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:57:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nRouterCertsDomainValidationControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets router-certs)\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:57:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\",Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:57:22Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:57:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps audit)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:57:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\" to \"APIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:57:32Z","reason":"SecretCreated","message":"Created Secret/webhook-authentication-integrated-oauth -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:57:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\" to \"APIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"APIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/authentication-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:57:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/authentication-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/authentication-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:57:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/authentication-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.173.5:443/healthz\\\": dial tcp 172.30.173.5:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015156762350016302 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-19T11:53:45Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-19T11:53:45Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003505115156762343014620 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":339,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-config-server","secrets":1},{"name":"machine-os-puller","secrets":1},{"name":"node-bootstrapper","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015156762342014106 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000007002515156762327014553 0ustar0000000000000000Mar 19 11:56:53.542988 master-0 kubenswrapper[6932]: I0319 11:56:53.542952 6932 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-ng9ss" podUID="a3ceeece-bee9-4fcb-8517-95ebce38e223" containerName="openshift-config-operator" probeResult="failure" output="Get \"https://10.128.0.17:8443/healthz\": dial tcp 10.128.0.17:8443: connect: connection refused" Mar 19 11:57:00.634773 master-0 kubenswrapper[6932]: I0319 11:57:00.634638 6932 patch_prober.go:28] interesting pod/catalogd-controller-manager-6864dc98f7-xzxpq container/manager namespace/openshift-catalogd: Readiness probe status=failure output="Get \"http://10.128.0.37:8081/readyz\": dial tcp 10.128.0.37:8081: connect: connection refused" start-of-body= Mar 19 11:57:00.635164 master-0 kubenswrapper[6932]: I0319 11:57:00.634794 6932 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-catalogd/catalogd-controller-manager-6864dc98f7-xzxpq" podUID="376b18a9-5f33-44fd-a37b-20ab02c5e65d" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.37:8081/readyz\": dial tcp 10.128.0.37:8081: connect: connection refused" Mar 19 11:57:00.635164 master-0 kubenswrapper[6932]: I0319 11:57:00.634694 6932 patch_prober.go:28] interesting pod/catalogd-controller-manager-6864dc98f7-xzxpq container/manager namespace/openshift-catalogd: Liveness probe status=failure output="Get \"http://10.128.0.37:8081/healthz\": dial tcp 10.128.0.37:8081: connect: connection refused" start-of-body= Mar 19 11:57:00.635164 master-0 kubenswrapper[6932]: I0319 11:57:00.634983 6932 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-catalogd/catalogd-controller-manager-6864dc98f7-xzxpq" podUID="376b18a9-5f33-44fd-a37b-20ab02c5e65d" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.37:8081/healthz\": dial tcp 10.128.0.37:8081: connect: connection refused" Mar 19 11:57:01.922026 master-0 kubenswrapper[6932]: E0319 11:57:01.921912 6932 mirror_client.go:138] "Failed deleting a mirror pod" err="Timeout: request did not complete within requested timeout - context deadline exceeded" pod="openshift-etcd/etcd-master-0-master-0" Mar 19 11:57:01.922836 master-0 kubenswrapper[6932]: E0319 11:57:01.922177 6932 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="34.012s" Mar 19 11:57:01.924457 master-0 kubenswrapper[6932]: E0319 11:57:01.924424 6932 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-controller-manager\" with CrashLoopBackOff: \"back-off 20s restarting failed container=kube-controller-manager pod=bootstrap-kube-controller-manager-master-0_kube-system(46f265536aba6292ead501bc9b49f327)\"" pod="kube-system/bootstrap-kube-controller-manager-master-0" podUID="46f265536aba6292ead501bc9b49f327" Mar 19 11:57:01.949441 master-0 kubenswrapper[6932]: I0319 11:57:01.949350 6932 patch_prober.go:28] interesting pod/marketplace-operator-89ccd998f-bftt4 container/marketplace-operator namespace/openshift-marketplace: Readiness probe status=failure output="Get \"http://10.128.0.12:8080/healthz\": dial tcp 10.128.0.12:8080: connect: connection refused" start-of-body= Mar 19 11:57:01.949785 master-0 kubenswrapper[6932]: I0319 11:57:01.949449 6932 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-marketplace/marketplace-operator-89ccd998f-bftt4" podUID="b3de8a1b-a5be-414f-86e8-738e16c8bc97" containerName="marketplace-operator" probeResult="failure" output="Get \"http://10.128.0.12:8080/healthz\": dial tcp 10.128.0.12:8080: connect: connection refused" Mar 19 11:57:02.089945 master-0 kubenswrapper[6932]: E0319 11:57:02.089905 6932 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 19 11:57:02.096056 master-0 kubenswrapper[6932]: E0319 11:57:02.096026 6932 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-controller-manager\" with CrashLoopBackOff: \"back-off 20s restarting failed container=kube-controller-manager pod=bootstrap-kube-controller-manager-master-0_kube-system(46f265536aba6292ead501bc9b49f327)\"" pod="kube-system/bootstrap-kube-controller-manager-master-0" podUID="46f265536aba6292ead501bc9b49f327" Mar 19 11:57:02.728913 master-0 kubenswrapper[6932]: I0319 11:57:02.728807 6932 patch_prober.go:28] interesting pod/operator-controller-controller-manager-57777556ff-mjwfm container/manager namespace/openshift-operator-controller: Readiness probe status=failure output="Get \"http://10.128.0.36:8081/readyz\": dial tcp 10.128.0.36:8081: connect: connection refused" start-of-body= Mar 19 11:57:02.728913 master-0 kubenswrapper[6932]: I0319 11:57:02.728883 6932 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-controller/operator-controller-controller-manager-57777556ff-mjwfm" podUID="1b94d1eb-1b80-4a14-b1c0-d9e192231352" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.36:8081/readyz\": dial tcp 10.128.0.36:8081: connect: connection refused" Mar 19 11:57:03.380694 master-0 kubenswrapper[6932]: I0319 11:57:03.380570 6932 patch_prober.go:28] interesting pod/controller-manager-548bb99f44-txbjj container/controller-manager namespace/openshift-controller-manager: Readiness probe status=failure output="Get \"https://10.128.0.49:8443/healthz\": dial tcp 10.128.0.49:8443: connect: connection refused" start-of-body= Mar 19 11:57:03.380694 master-0 kubenswrapper[6932]: I0319 11:57:03.380625 6932 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-controller-manager/controller-manager-548bb99f44-txbjj" podUID="76cf2b01-33d9-47eb-be5d-44946c78bf20" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.49:8443/healthz\": dial tcp 10.128.0.49:8443: connect: connection refused" Mar 19 11:57:03.380947 master-0 kubenswrapper[6932]: I0319 11:57:03.380681 6932 patch_prober.go:28] interesting pod/controller-manager-548bb99f44-txbjj container/controller-manager namespace/openshift-controller-manager: Liveness probe status=failure output="Get \"https://10.128.0.49:8443/healthz\": dial tcp 10.128.0.49:8443: connect: connection refused" start-of-body= Mar 19 11:57:03.380947 master-0 kubenswrapper[6932]: I0319 11:57:03.380814 6932 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-controller-manager/controller-manager-548bb99f44-txbjj" podUID="76cf2b01-33d9-47eb-be5d-44946c78bf20" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.49:8443/healthz\": dial tcp 10.128.0.49:8443: connect: connection refused" Mar 19 11:57:05.178284 master-0 kubenswrapper[6932]: E0319 11:57:05.178123 6932 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{control-plane-machine-set-operator-6f97756bc8-j7rc9.189e3bfc0b52f3d2 openshift-machine-api 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-machine-api,Name:control-plane-machine-set-operator-6f97756bc8-j7rc9,UID:7a51eeaf-1349-4bf3-932d-22ed5ce7c161,APIVersion:v1,ResourceVersion:8902,FieldPath:spec.containers{control-plane-machine-set-operator},},Reason:Started,Message:Started container control-plane-machine-set-operator,Source:EventSource{Component:kubelet,Host:master-0,},FirstTimestamp:2026-03-19 11:54:16.938337234 +0000 UTC m=+81.297397456,LastTimestamp:2026-03-19 11:54:16.938337234 +0000 UTC m=+81.297397456,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:master-0,}" Mar 19 11:57:06.524833 master-0 kubenswrapper[6932]: E0319 11:57:06.524707 6932 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="7s" Mar 19 11:57:11.943883 master-0 kubenswrapper[6932]: I0319 11:57:11.943777 6932 patch_prober.go:28] interesting pod/marketplace-operator-89ccd998f-bftt4 container/marketplace-operator namespace/openshift-marketplace: Readiness probe status=failure output="Get \"http://10.128.0.12:8080/healthz\": dial tcp 10.128.0.12:8080: connect: connection refused" start-of-body= Mar 19 11:57:11.944612 master-0 kubenswrapper[6932]: I0319 11:57:11.943882 6932 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-marketplace/marketplace-operator-89ccd998f-bftt4" podUID="b3de8a1b-a5be-414f-86e8-738e16c8bc97" containerName="marketplace-operator" probeResult="failure" output="Get \"http://10.128.0.12:8080/healthz\": dial tcp 10.128.0.12:8080: connect: connection refused" Mar 19 11:57:12.090466 master-0 kubenswrapper[6932]: E0319 11:57:12.090258 6932 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 19 11:57:12.090466 master-0 kubenswrapper[6932]: E0319 11:57:12.090315 6932 kubelet_node_status.go:572] "Unable to update node status" err="update node status exceeds retry count" Mar 19 11:57:12.223508 master-0 kubenswrapper[6932]: E0319 11:57:12.223326 6932 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="10.3s" Mar 19 11:57:12.225278 master-0 kubenswrapper[6932]: E0319 11:57:12.225129 6932 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-controller-manager\" with CrashLoopBackOff: \"back-off 20s restarting failed container=kube-controller-manager pod=bootstrap-kube-controller-manager-master-0_kube-system(46f265536aba6292ead501bc9b49f327)\"" pod="kube-system/bootstrap-kube-controller-manager-master-0" podUID="46f265536aba6292ead501bc9b49f327" Mar 19 11:57:12.282959 master-0 kubenswrapper[6932]: I0319 11:57:12.279400 6932 patch_prober.go:28] interesting pod/openshift-config-operator-95bf4f4d-ng9ss container/openshift-config-operator namespace/openshift-config-operator: Readiness probe status=failure output="Get \"https://10.128.0.17:8443/healthz\": dial tcp 10.128.0.17:8443: connect: connection refused" start-of-body= Mar 19 11:57:12.282959 master-0 kubenswrapper[6932]: I0319 11:57:12.279424 6932 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-ng9ss" podUID="a3ceeece-bee9-4fcb-8517-95ebce38e223" containerName="openshift-config-operator" probeResult="failure" output="Get \"https://10.128.0.17:8443/healthz\": dial tcp 10.128.0.17:8443: connect: connection refused" Mar 19 11:57:12.553018 master-0 kubenswrapper[6932]: E0319 11:57:12.551138 6932 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"c2c2b96a5faf69402dfe85ec6b2718eb42ca2ecf78927fa96ef82a61fc3c2da6\": container with ID starting with c2c2b96a5faf69402dfe85ec6b2718eb42ca2ecf78927fa96ef82a61fc3c2da6 not found: ID does not exist" containerID="c2c2b96a5faf69402dfe85ec6b2718eb42ca2ecf78927fa96ef82a61fc3c2da6" Mar 19 11:57:12.596446 master-0 kubenswrapper[6932]: E0319 11:57:12.596348 6932 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"294d8a4101a65cda21ec3874afc3a3c7bd30756c657037c09db78beaa20e4b9c\": container with ID starting with 294d8a4101a65cda21ec3874afc3a3c7bd30756c657037c09db78beaa20e4b9c not found: ID does not exist" containerID="294d8a4101a65cda21ec3874afc3a3c7bd30756c657037c09db78beaa20e4b9c" Mar 19 11:57:12.598408 master-0 kubenswrapper[6932]: E0319 11:57:12.598109 6932 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"58cc59848776f9368dd32da99bd6c9b9284f95df012df470d98ae16fe81785f6\": container with ID starting with 58cc59848776f9368dd32da99bd6c9b9284f95df012df470d98ae16fe81785f6 not found: ID does not exist" containerID="58cc59848776f9368dd32da99bd6c9b9284f95df012df470d98ae16fe81785f6" Mar 19 11:57:13.179470 master-0 kubenswrapper[6932]: E0319 11:57:13.179409 6932 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-controller-manager\" with CrashLoopBackOff: \"back-off 20s restarting failed container=kube-controller-manager pod=bootstrap-kube-controller-manager-master-0_kube-system(46f265536aba6292ead501bc9b49f327)\"" pod="kube-system/bootstrap-kube-controller-manager-master-0" podUID="46f265536aba6292ead501bc9b49f327" Mar 19 11:57:25.257004 master-0 kubenswrapper[6932]: E0319 11:57:25.256914 6932 kubelet.go:1929] "Failed creating a mirror pod for" err="Internal error occurred: admission plugin \"LimitRanger\" failed to complete mutation in 13s" pod="openshift-etcd/etcd-master-0" Mar 19 11:57:27.917793 master-0 kubenswrapper[6932]: E0319 11:57:27.917712 6932 kubelet.go:1929] "Failed creating a mirror pod for" err="pods \"etcd-master-0\" is forbidden: the server was unable to return a response in the time allotted, but may still be processing the request (get limitranges)" pod="openshift-etcd/etcd-master-0" Mar 19 11:57:29.496783 master-0 kubenswrapper[6932]: E0319 11:57:29.496679 6932 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="870e66ff-82ed-4c91-8197-dddcb78048c2" containerName="installer" Mar 19 11:57:29.496783 master-0 kubenswrapper[6932]: E0319 11:57:29.496715 6932 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="6bde080b-3820-463f-a27d-9fb9a7843d5d" containerName="installer" Mar 19 11:57:29.496783 master-0 kubenswrapper[6932]: E0319 11:57:29.496762 6932 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="8e508a43-99db-49eb-bf4e-e3e6a0f49761" containerName="installer" Mar 19 11:57:29.496783 master-0 kubenswrapper[6932]: E0319 11:57:29.496778 6932 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="c385dd73-4a25-4827-9c8f-d923afc782b7" containerName="installer" Mar 19 11:57:32.478420 master-0 kubenswrapper[6932]: E0319 11:57:32.478234 6932 kubelet_node_status.go:585] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2026-03-19T11:57:22Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-03-19T11:57:22Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-03-19T11:57:22Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-03-19T11:57:22Z\\\",\\\"type\\\":\\\"Ready\\\"}],\\\"images\\\":[{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7\\\"],\\\"sizeBytes\\\":1637455533},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36\\\"],\\\"sizeBytes\\\":1238100502},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015\\\"],\\\"sizeBytes\\\":991832673},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9\\\"],\\\"sizeBytes\\\":943841779},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa\\\"],\\\"sizeBytes\\\":876160834},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\\\"],\\\"sizeBytes\\\":862657321},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8a9e8da5c6114f062b814936d4db7a47a04d248e160d6bb28ad4e4a081496ee4\\\"],\\\"sizeBytes\\\":772943435},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e1faad2d9167d84e23585c1cea5962301845548043cf09578f943f79ca98016\\\"],\\\"sizeBytes\\\":687949580},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d\\\"],\\\"sizeBytes\\\":683195416},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a\\\"],\\\"sizeBytes\\\":677942383},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4\\\"],\\\"sizeBytes\\\":621648710},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\\\"],\\\"sizeBytes\\\":589386806},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55\\\"],\\\"sizeBytes\\\":582154903},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982\\\"],\\\"sizeBytes\\\":558211175},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7af9f5c5af9d529840233ef4b519120cc0e3f14c4fe28cc43b0823f2c11d8f89\\\"],\\\"sizeBytes\\\":548752816},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\\\"],\\\"sizeBytes\\\":529326739},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946\\\"],\\\"sizeBytes\\\":528956487},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\\\"],\\\"sizeBytes\\\":518384969},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\\\"],\\\"sizeBytes\\\":517999161},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\\\"],\\\"sizeBytes\\\":514984269},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\\\"],\\\"sizeBytes\\\":513221333},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\\\"],\\\"sizeBytes\\\":512274055},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098\\\"],\\\"sizeBytes\\\":511227324},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11\\\"],\\\"sizeBytes\\\":511164375},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\\\"],\\\"sizeBytes\\\":508888171},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263\\\"],\\\"sizeBytes\\\":508544745},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71\\\"],\\\"sizeBytes\\\":507972093},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7c527b4e8239a1f4f4e0a851113e7dd633b7dcb9d75b0e7b21c23d26304abcb3\\\"],\\\"sizeBytes\\\":506480167},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\\\"],\\\"sizeBytes\\\":506395599},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\\\"],\\\"sizeBytes\\\":505345991},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d\\\"],\\\"sizeBytes\\\":505246690},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252\\\"],\\\"sizeBytes\\\":504625081},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69\\\"],\\\"sizeBytes\\\":495994673},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023\\\"],\\\"sizeBytes\\\":495065340},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b\\\"],\\\"sizeBytes\\\":487096305},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a746a87b784ea1caa278fd0e012554f9df520b6fff665ea0bc4c83f487fed113\\\"],\\\"sizeBytes\\\":484450894},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12\\\"],\\\"sizeBytes\\\":484187929},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:908eaaf624959bc7645f6d585d160431d1efb070e9a1f37fefed73a3be42b0d3\\\"],\\\"sizeBytes\\\":470681292},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ea5c8a93f30e0a4932da5697d22c0da7eda9a7035c0555eb006b6755e62bb2fc\\\"],\\\"sizeBytes\\\":468265024},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed\\\"],\\\"sizeBytes\\\":465090934},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24\\\"],\\\"sizeBytes\\\":463705930},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:632e80bba5077068ecca05fddb95aedebad4493af6f36152c01c6ae490975b62\\\"],\\\"sizeBytes\\\":458126937},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe\\\"],\\\"sizeBytes\\\":456576198},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739\\\"],\\\"sizeBytes\\\":448828620},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85\\\"],\\\"sizeBytes\\\":448042136},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0\\\"],\\\"sizeBytes\\\":443272037},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483\\\"],\\\"sizeBytes\\\":438654374},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e\\\"],\\\"sizeBytes\\\":411587146},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014\\\"],\\\"sizeBytes\\\":407347125},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:53d66d524ca3e787d8dbe30dbc4d9b8612c9cebd505ccb4375a8441814e85422\\\"],\\\"sizeBytes\\\":396521761}],\\\"runtimeHandlers\\\":[{\\\"features\\\":{\\\"recursiveReadOnlyMounts\\\":true,\\\"userNamespaces\\\":true},\\\"name\\\":\\\"crun\\\"},{\\\"features\\\":{\\\"recursiveReadOnlyMounts\\\":true,\\\"userNamespaces\\\":true},\\\"name\\\":\\\"\\\"},{\\\"features\\\":{\\\"recursiveReadOnlyMounts\\\":true,\\\"userNamespaces\\\":true},\\\"name\\\":\\\"runc\\\"}]}}\" for node \"master-0\": Patch \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0/status?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 19 11:57:37.537906 master-0 kubenswrapper[6932]: E0319 11:57:37.537681 6932 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"405681b4e087bf984381117ea7b1c3ba995ceb7dc4c6f465e5df580e2befefed\": container with ID starting with 405681b4e087bf984381117ea7b1c3ba995ceb7dc4c6f465e5df580e2befefed not found: ID does not exist" containerID="405681b4e087bf984381117ea7b1c3ba995ceb7dc4c6f465e5df580e2befefed" Mar 19 11:57:37.538159 master-0 kubenswrapper[6932]: E0319 11:57:37.538125 6932 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"0cf8f5f7d033dcecb519d5f330a3bdb1844539d062ac064cc4e8a74d131c9002\": container with ID starting with 0cf8f5f7d033dcecb519d5f330a3bdb1844539d062ac064cc4e8a74d131c9002 not found: ID does not exist" containerID="0cf8f5f7d033dcecb519d5f330a3bdb1844539d062ac064cc4e8a74d131c9002" Mar 19 11:57:37.538456 master-0 kubenswrapper[6932]: E0319 11:57:37.538438 6932 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"a9e27f322bd00992bb4993c33f61aa9b49e3677fa4a2096a53f4ef8f27534fba\": container with ID starting with a9e27f322bd00992bb4993c33f61aa9b49e3677fa4a2096a53f4ef8f27534fba not found: ID does not exist" containerID="a9e27f322bd00992bb4993c33f61aa9b49e3677fa4a2096a53f4ef8f27534fba" Mar 19 11:57:38.202051 master-0 kubenswrapper[6932]: E0319 11:57:38.201910 6932 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="64f5cbf1-f761-4531-8e5c-1f9b318b0cb9" containerName="extract-content" Mar 19 11:57:38.202051 master-0 kubenswrapper[6932]: E0319 11:57:38.201952 6932 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="64f5cbf1-f761-4531-8e5c-1f9b318b0cb9" containerName="extract-utilities" Mar 19 11:57:38.202051 master-0 kubenswrapper[6932]: E0319 11:57:38.201979 6932 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="64f5cbf1-f761-4531-8e5c-1f9b318b0cb9" containerName="registry-server" Mar 19 11:57:38.670059 master-0 kubenswrapper[6932]: E0319 11:57:38.669671 6932 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="ad27ee0f-ea6b-46a9-a7fd-7e04e9a3d73c" containerName="extract-utilities" Mar 19 11:57:38.670059 master-0 kubenswrapper[6932]: E0319 11:57:38.669753 6932 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="ad27ee0f-ea6b-46a9-a7fd-7e04e9a3d73c" containerName="registry-server" Mar 19 11:57:38.670059 master-0 kubenswrapper[6932]: E0319 11:57:38.669777 6932 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="ad27ee0f-ea6b-46a9-a7fd-7e04e9a3d73c" containerName="extract-content" Mar 19 11:57:59.036076 master-0 kubenswrapper[6932]: E0319 11:57:59.036004 6932 cadvisor_stats_provider.go:516] "Partial failure issuing cadvisor.ContainerInfoV2" err="partial failures: [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podcbfd5667_f6f4_4c7c_92b2_ea4ecd0f0103.slice/crio-1e03cf34918a9df69167cf80628d7425b9668e84a411e5ec9a6953baa6d085c1.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podcbfd5667_f6f4_4c7c_92b2_ea4ecd0f0103.slice/crio-conmon-1e03cf34918a9df69167cf80628d7425b9668e84a411e5ec9a6953baa6d085c1.scope\": RecentStats: unable to find data in memory cache]" Mar 19 11:58:09.148309 master-0 kubenswrapper[6932]: E0319 11:58:09.148255 6932 cadvisor_stats_provider.go:516] "Partial failure issuing cadvisor.ContainerInfoV2" err="partial failures: [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podcbfd5667_f6f4_4c7c_92b2_ea4ecd0f0103.slice/crio-conmon-1e03cf34918a9df69167cf80628d7425b9668e84a411e5ec9a6953baa6d085c1.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podcbfd5667_f6f4_4c7c_92b2_ea4ecd0f0103.slice/crio-1e03cf34918a9df69167cf80628d7425b9668e84a411e5ec9a6953baa6d085c1.scope\": RecentStats: unable to find data in memory cache]"aggregated/ingress_controllers_certs.json0000640000000000000000000000045715156762327017551 0ustar0000000000000000[{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-03-19T11:53:44Z","not_after":"2028-03-18T11:53:45Z","controllers":[]},{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-03-19T11:53:43Z","not_after":"2028-03-18T11:53:44Z","controllers":[]}]config/clusteroperator/storage.json0000640000000000000000000000321315156762327016316 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"6998e992-3aaa-4181-9471-b0c1199ead9e","resourceVersion":"10292","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-03-19T11:58:14Z","reason":"NoData"},{"type":"Progressing","status":"Unknown","lastTransitionTime":"2026-03-19T11:58:14Z","reason":"NoData"},{"type":"Available","status":"Unknown","lastTransitionTime":"2026-03-19T11:58:14Z","reason":"NoData"},{"type":"Upgradeable","status":"Unknown","lastTransitionTime":"2026-03-19T11:58:14Z","reason":"NoData"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:58:14Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315156762327016674 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"b9c689cc-7ab7-474f-a14e-058dbf1fa901","resourceVersion":"4764","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:16Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:53:21Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:53:18Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:18Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:16Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000307615156762327024701 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"445354f7-52be-4631-9ff9-90bbde45e03b","resourceVersion":"9411","generation":1,"creationTimestamp":"2026-03-19T11:47:32Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:54:13Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-19T11:54:13Z","reason":"ClusterServiceVersionNotSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Failed with reason: NoOperatorGroup, message: csv in namespace with no operatorgroups"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:57:33Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:54:13Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255515156762327023472 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"bcc96c37-7ffc-40ca-a819-13618b544849","resourceVersion":"9261","generation":1,"creationTimestamp":"2026-03-19T11:47:32Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:54:13Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:57:10Z","message":"Deployed 4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:54:13Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:54:13Z"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115156762327022056 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"6c42f1c8-5288-47be-a677-5baa096294b6","resourceVersion":"8878","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:54:13Z","message":"Deployed 4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:54:13Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:54:13Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:54:13Z"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315156762327020320 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"0814c9f1-8e61-43ca-af8a-fb67bf70b55e","resourceVersion":"719","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000377215156762327022454 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"17331c2c-5335-4ff8-adb8-75031d66d891","resourceVersion":"8281","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:21Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:53:24Z","reason":"_DesiredStateNotYetAchieved","message":"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\nProgressing: deployment/route-controller-manager: observed generation is 3, desired generation is 4."},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:54:02Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:24Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:21Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215156762327020652 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"957ba7bd-b83b-49a3-b1bd-260b8bc7bd82","resourceVersion":"8163","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:18Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:53:59Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-19T11:53:19Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:18Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:18Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"openshift-apiserver","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420415156762327015443 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"ceb68479-134b-45e8-8301-025caecc77d1","resourceVersion":"7200","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:21Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:53:56Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:53:56Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:21Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:21Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115156762327017102 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"2dcd57ba-a69e-4b3d-b98e-f2a48b3b9619","resourceVersion":"6653","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:53:44Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.35\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:53:46Z","reason":"AsExpected","message":"Cluster version is \"4.18.35\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:42Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.35"},{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003615415156762327016355 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"2f4f94a4-9642-4e06-a030-87fc67a5514a","resourceVersion":"8776","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-03-19T11:51:52Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:51:40Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:51:40Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:54:10Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:53:00Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-flatfile-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715156762327017046 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"4a141c75-abfd-469c-9414-55a42ff2cd01","resourceVersion":"8678","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-03-19T11:54:07Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-03-19T11:54:07Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:54:07Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:54:07Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315156762327017143 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"44dfa16f-ca45-4d32-ac89-3b45ed15157d","resourceVersion":"8735","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:54:08Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.35"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:54:08Z","reason":"OperatorAvailable","message":"Available release version: 4.18.35"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:54:08Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:54:08Z","reason":"OperatorAvailable","message":"Available release version: 4.18.35"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000230015156762327017515 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"15b2e7c4-07bc-43a9-af1c-3ef711b0c60e","resourceVersion":"827","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"","resource":"nodes","name":""}],"extension":null}}config/clusteroperator/machine-approver.json0000640000000000000000000000146715156762327020123 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"ab43ca1b-8be9-47dc-8f22-5f1b514d2f50","resourceVersion":"811","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371415156762327017033 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"746a4d33-d00d-4429-afbb-414dcc052d07","resourceVersion":"10276","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:58:14Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:58:14Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:58:14Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:58:14Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315156762327022553 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"f148b321-0bc4-4f85-9d55-4567dce36acd","resourceVersion":"4522","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:13Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:53:18Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:53:18Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:13Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:13Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615156762327017563 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"4dcbdea0-44e6-4873-8e41-b60179f840d0","resourceVersion":"7828","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:16Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:53:31Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-19T11:53:17Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:16Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:16Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715156762327021404 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"9db2064f-ebea-4f4a-9c78-289ab1177b3b","resourceVersion":"8798","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:18Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:53:54Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-19T11:53:19Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:18Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:18Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000520015156762327017574 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"e0dd54c6-0cec-423d-8c67-eb6de42687d8","resourceVersion":"10054","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:52:52Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:53:47Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-19T11:52:53Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:52:52Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-19T11:52:52Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000141415156762327016503 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"8a279bd9-4fe1-4b68-a1b1-76c4cd6ad42f","resourceVersion":"741","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/ingress.json0000640000000000000000000000456715156762327016341 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"bf04ed22-fb21-4b85-a271-ffc7bd789ffd","resourceVersion":"6633","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:53:45Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:53:44Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:44Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:44Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-19T11:53:44Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715156762327017606 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"18494b62-9061-43fc-b80b-831ddee033a5","resourceVersion":"815","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015156762327015600 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"d8abfcc6-80bf-44d2-b04e-2c0c3ed215a0","resourceVersion":"6223","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:21Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:53:38Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-19T11:53:22Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:21Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:21Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515156762327015450 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"da337314-c8c6-4330-b8d6-2e3a9ce0fa69","resourceVersion":"8801","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:54:12Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:53:43Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:54:12Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:42Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715156762327021452 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"0a477cbf-6f4a-4cb7-b7ea-420cd2ff1c2f","resourceVersion":"9356","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:06Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:53:10Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:53:10Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:06Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:06Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"csi-snapshot-controller","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263615156762327021632 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"cebd8223-a507-4982-af2d-c22fbcfa4fac","resourceVersion":"10061","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:57:57Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:57:57Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:57:57Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:57:57Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215156762327016312 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"9886a60f-17ff-4b59-b3d7-6b69935f53b8","resourceVersion":"708","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615156762327017752 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"4700adf5-62cc-45b9-97c7-6379fc6df893","resourceVersion":"4128","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:08Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:53:08Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:53:08Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:08Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:08Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.35"},{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000266015156762327020500 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"3d314ea5-df5a-4b64-8d0f-1312615eef48","resourceVersion":"10281","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:58:13Z","reason":"AsExpected","message":"at version 4.18.35"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:58:14Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:58:14Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:58:13Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000001521715156762327020077 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"02819931-2949-48a4-84a0-ab2a2b091e57","resourceVersion":"10293","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:58:14Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:58:14Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:58:14Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:58:14Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000173715156762327021562 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"ce9035f2-0481-4ee9-a842-b6c0aa29346a","resourceVersion":"817","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427115156762327016613 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"366d76f0-997e-47c6-8449-8b4d4c3f4580","resourceVersion":"10180","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:58:13Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:58:13Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:58:13Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:58:13Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-19T11:58:13Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000771015156762327017677 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"4eccd66b-cdca-4884-b16b-cf27b70040d0","resourceVersion":"9485","generation":1,"creationTimestamp":"2026-03-19T11:47:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"True","lastTransitionTime":"2026-03-19T11:56:55Z","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:57:22Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-19T11:53:06Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.173.5:443/healthz\": dial tcp 172.30.173.5:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:06Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:05Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"oauth-apiserver","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515156762327023233 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115156762327025443 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715156762327025152 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715156762327025143 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315156762327022263 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515156762327026717 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115156762327023422 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115156762327023216 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115156762327025506 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- aggregated/unused_machine_configs_count.json0000640000000000000000000000004115156762327020145 0ustar0000000000000000{"unused_machineconfigs_count":9}config/running_containers.json0000640000000000000000000001036715156762327015332 0ustar0000000000000000{"images":{"0":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","1":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","10":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","11":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","12":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","13":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","14":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","15":"sha256:908eaaf624959bc7645f6d585d160431d1efb070e9a1f37fefed73a3be42b0d3","16":"sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","17":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","18":"registry.redhat.io/redhat/certified-operator-index:v4.18","19":"sha256:632e80bba5077068ecca05fddb95aedebad4493af6f36152c01c6ae490975b62","2":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","20":"sha256:ce8e3088493b4a72dd766b3b5b4ccb83b7d72d514bbf64063a913dfe961273db","21":"sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946","22":"sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","23":"sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","24":"sha256:7c527b4e8239a1f4f4e0a851113e7dd633b7dcb9d75b0e7b21c23d26304abcb3","25":"sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","26":"sha256:7af9f5c5af9d529840233ef4b519120cc0e3f14c4fe28cc43b0823f2c11d8f89","27":"sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014","28":"sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe","29":"sha256:ea5c8a93f30e0a4932da5697d22c0da7eda9a7035c0555eb006b6755e62bb2fc","3":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","30":"sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12","31":"sha256:1973d56a1097a48ea0ebf2c4dbae1ed86fa67bb0116f4962f7720d48aa337d27","32":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","33":"sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","34":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","35":"sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b","36":"sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252","37":"sha256:30a2f97d7785ce8b0ea5115e67c4554b64adefbc7856bcf6f4fe6cc7e938a310","38":"registry.redhat.io/redhat/redhat-operator-index:v4.18","39":"sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e","4":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","40":"sha256:82f2c59d19eb73ad5c0f93b0a63003c1885f5297959c9c45b401d1a74aea6e76","41":"sha256:a746a87b784ea1caa278fd0e012554f9df520b6fff665ea0bc4c83f487fed113","42":"registry.redhat.io/redhat/community-operator-index:v4.18","43":"sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d","44":"sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","45":"sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","46":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","47":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","48":"sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","49":"sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739","5":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","50":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","6":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","7":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","8":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","9":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55"},"containers":{"2026-03":{"0":13,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":1,"16":1,"17":1,"18":1,"19":1,"2":8,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":4,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":4,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"49":1,"5":3,"50":1,"6":2,"7":2,"8":2,"9":2}}}operator-controller-controller-manager-57777556ff-mjwfm.json0000640000000000000000000002474415156762327032342 0ustar0000000000000000config/pod/openshift-operator-controller{"metadata":{"name":"operator-controller-controller-manager-57777556ff-mjwfm","generateName":"operator-controller-controller-manager-57777556ff-","namespace":"openshift-operator-controller","uid":"1b94d1eb-1b80-4a14-b1c0-d9e192231352","resourceVersion":"9304","creationTimestamp":"2026-03-19T11:53:32Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"57777556ff"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.36/23\"],\"mac_address\":\"0a:58:0a:80:00:24\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.36/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.36\"\n ],\n \"mac\": \"0a:58:0a:80:00:24\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-57777556ff","uid":"ea798441-d83e-4794-bc5b-ed32b27af518","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-srlcl","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-srlcl","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-srlcl","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:44Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:32Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:22Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:22Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:32Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.36","podIPs":[{"ip":"10.128.0.36"}],"startTime":"2026-03-19T11:53:32Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-19T11:53:42Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://b1e2d143823123ceb6bd23805a885b259bd2c9edae2f5dbbc3924a67acd5c3c1","started":true,"volumeMounts":[{"name":"kube-api-access-srlcl","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-19T11:57:12Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"3ed8dc96-9b13-46ca-bac7-3cafc7d54668\"\nI0319 11:54:02.022332 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"3ed8dc96-9b13-46ca-bac7-3cafc7d54668\"\nI0319 11:54:02.198086 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"2203520c-6098-4ecc-80fb-d01f8acc7eb9\"\nI0319 11:54:02.198143 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"2203520c-6098-4ecc-80fb-d01f8acc7eb9\"\nE0319 11:55:08.628649 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0319 11:56:08.631498 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI0319 11:56:21.622101 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE0319 11:56:21.622286 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-19T11:53:42Z","finishedAt":"2026-03-19T11:56:21Z","containerID":"cri-o://8fcb298ecd66e79f2851c7b4502a7734938f56462fb5de52ed324ec2a3679f14"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","containerID":"cri-o://54f6f1a412b81f0f7c7a43eff29ebb6260a16932752b0d9e46f5d27af722be26","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-srlcl","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/network-operator-7bd846bfc4-7fz6w.json0000640000000000000000000002514215156762327025501 0ustar0000000000000000{"metadata":{"name":"network-operator-7bd846bfc4-7fz6w","generateName":"network-operator-7bd846bfc4-","namespace":"openshift-network-operator","uid":"3c3b0d24-ce5e-49c3-a546-874356f75dc6","resourceVersion":"9201","creationTimestamp":"2026-03-19T11:51:32Z","labels":{"name":"network-operator","pod-template-hash":"7bd846bfc4"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-7bd846bfc4","uid":"ef4d65d7-9118-49aa-ba44-9086cb9ce1fa","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-pngsr","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:02f0aa65dfd2a58e13248b4e2078caec450fa2bdbacb3afeb34d1de30c909b0f"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:896642a5bdda0cdbeccb0293d3de85f8882ac72678df8d12fb501fd3367982af"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b6140aa21678d5652c4d09e21eab5dfad35af30902b705c70f72a384e43868ac"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da26695a0ab94eddc0841bf2ed51b30921e2cdc2a9a5acd0d951081de67f1a97"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a22978e1669cdbaeee6ec0800f83559b56a2344f1c003f8cd60f27fac939680e"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-pngsr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:51:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:51:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:12Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:12Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:51:32Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-19T11:51:34Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-03-19T11:55:54Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"nshift-iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0319 11:54:25.539016 1 log.go:245] reconciling (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter\nI0319 11:54:25.539063 1 log.go:245] could not apply (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: failed to apply / update (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0319 11:54:25.539079 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter\nI0319 11:54:25.539130 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0319 11:54:25.539147 1 log.go:245] reconciling (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script\nI0319 11:54:25.539209 1 log.go:245] could not apply (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: failed to apply / update (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: client rate limiter Wait returned an error: context canceled\nI0319 11:54:25.539224 1 log.go:245] reconciling (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter\nI0319 11:54:25.539327 1 log.go:245] could not apply (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: failed to apply / update (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0319 11:54:30.535992 1 observer_polling.go:162] Shutting down file observer\nF0319 11:54:55.536558 1 operator.go:133] Failed to start controller-runtime manager: failed waiting for all runnables to end within grace period of 30s: context deadline exceeded\n","startedAt":"2026-03-19T11:51:40Z","finishedAt":"2026-03-19T11:54:55Z","containerID":"cri-o://a35a4f30770261f78e16c8cbde80e6ad1d01d59985d717446c5cf700c3ca0a3e"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","containerID":"cri-o://05b8cd521fd3c020a5958732718cd5b93105a635a1a43569b2bb722ef0b36180","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-pngsr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-j528w.json0000640000000000000000000002463315156762327025570 0ustar0000000000000000{"metadata":{"name":"network-node-identity-j528w","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"8438d015-106b-4aed-ae12-dda781ce51fc","resourceVersion":"9218","creationTimestamp":"2026-03-19T11:52:12Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"5d8cf8bd5d","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"7107a5c2-3b81-409a-8f66-73c9d03ff86f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-cqr6w","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-cqr6w","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-cqr6w","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:35Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:12Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:12Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:12Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:12Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-19T11:52:12Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-03-19T11:55:54Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"k9js5\"} reason=\"CSRApproved\"\nI0319 11:52:42.626315 1 approver.go:230] Finished syncing CSR csr-k9js5 for master-0 node in 16.900822ms\nI0319 11:52:42.626478 1 approver.go:230] Finished syncing CSR csr-k9js5 for unknown node in 92.212µs\nI0319 11:52:42.646527 1 approver.go:230] Finished syncing CSR csr-k9js5 for unknown node in 114.383µs\nI0319 11:52:48.485151 1 recorder.go:104] \"CSR \\\"csr-9gbqw\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-9gbqw\"} reason=\"CSRApproved\"\nI0319 11:52:48.493118 1 approver.go:230] Finished syncing CSR csr-9gbqw for master-0 node in 8.289942ms\nI0319 11:52:48.493276 1 approver.go:230] Finished syncing CSR csr-9gbqw for unknown node in 79.741µs\nI0319 11:52:48.500616 1 approver.go:230] Finished syncing CSR csr-9gbqw for unknown node in 52.351µs\nE0319 11:54:31.367693 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path\nE0319 11:54:46.367412 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0319 11:54:46.367460 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0319 11:55:01.368294 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nF0319 11:55:01.368506 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2026-03-19T11:52:34Z","finishedAt":"2026-03-19T11:55:01Z","containerID":"cri-o://27aeacdf42166ebdfe7943145673659894eb1a05c94251adf45a06c9d05c04a8"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","containerID":"cri-o://97eb1a465790bd720388085fc15badddd0717999fea7e03106e51d2d591513fd","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-cqr6w","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-03-19T11:52:34Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","containerID":"cri-o://e31563606c69089c8d00a2fd1e9f5279c225bb040e3b5e23507eceec4a5f5634","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-cqr6w","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001521215156762327026270 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"babe22da-6379-42e2-9c77-bc8ce81849a0","resourceVersion":"3815","creationTimestamp":"2026-03-19T11:51:35Z","labels":{"k8s-app":"kube-rbac-proxy-crio"},"annotations":{"kubernetes.io/config.hash":"1249822f86f23526277d165c0d5d3c19","kubernetes.io/config.mirror":"1249822f86f23526277d165c0d5d3c19","kubernetes.io/config.seen":"2026-03-19T11:50:55.505796817Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"41b47749-a7d7-429f-9c0a-3925a76dc079","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-19T11:52:56Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-19T11:50:58Z","finishedAt":"2026-03-19T11:50:58Z","containerID":"cri-o://5b728a95b5ae31dab98e905315ad7bc4e11c06682ed7961c2f8d666cf463933f"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://5b728a95b5ae31dab98e905315ad7bc4e11c06682ed7961c2f8d666cf463933f","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-03-19T11:51:46Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0319 11:51:19.936563 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0319 11:51:19.936785 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0319 11:51:19.940267 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-03-19T11:51:19Z","finishedAt":"2026-03-19T11:51:19Z","containerID":"cri-o://d4ec9f8652caf61956bb350585a200ee75b716b204eab89e8110dd9c8c54f2a5"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://0252eb9b3a6c4d52db4e7759da29168fb6757ff67b4995374ebfa16c86b93541","started":true}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-66b84d69b-qrjj4.json0000640000000000000000000002431015156762327025267 0ustar0000000000000000{"metadata":{"name":"ingress-operator-66b84d69b-qrjj4","generateName":"ingress-operator-66b84d69b-","namespace":"openshift-ingress-operator","uid":"163d6a3d-0080-4122-bb7a-17f6e63f00f0","resourceVersion":"9217","creationTimestamp":"2026-03-19T11:51:31Z","labels":{"name":"ingress-operator","pod-template-hash":"66b84d69b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.18/23\"],\"mac_address\":\"0a:58:0a:80:00:12\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.18/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.18\"\n ],\n \"mac\": \"0a:58:0a:80:00:12\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-66b84d69b","uid":"b6f19d16-cebe-454e-a27b-d9f8c35b84b1","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-m7tc5","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-m7tc5","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-m7tc5","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:42Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:49Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:12Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:12Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:49Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.18","podIPs":[{"ip":"10.128.0.18"}],"startTime":"2026-03-19T11:52:49Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-03-19T11:57:02Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"nformers.go:106: watch of *v1.Deployment ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-19T11:56:13.395Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\nW0319 11:56:13.395923 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DNSRecord ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0319 11:56:13.396046 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.FeatureGate ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0319 11:56:13.396097 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Service ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0319 11:56:13.396218 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Proxy ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-19T11:56:13.396Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"[failed to wait for route_metrics_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route, failed waiting for all runnables to end within grace period of 30s: context deadline exceeded]\", \"errorCauses\": [{\"error\": \"failed to wait for route_metrics_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}, {\"error\": \"failed waiting for all runnables to end within grace period of 30s: context deadline exceeded\"}]}\n","startedAt":"2026-03-19T11:53:42Z","finishedAt":"2026-03-19T11:56:13Z","containerID":"cri-o://a5a674d7299c49bd88f1c56fca174966ef4c28920edc64023b6ce41812e041c8"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","containerID":"cri-o://ceffe432bb3380aafe0729954185b3652b99ca21e97ac6c1e688d47217f36148","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-m7tc5","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-19T11:53:42Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://f9468c3e1600a144d91d27a137ca22e8dab8af4aed5534ad99b6957d73bac349","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-m7tc5","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator-8c94f4649-6ghdm.json0000640000000000000000000001660615156762327033361 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-8c94f4649-6ghdm","generateName":"openshift-controller-manager-operator-8c94f4649-","namespace":"openshift-controller-manager-operator","uid":"e7f0a5ee-5e7a-4946-bffa-5d98aa5890bf","resourceVersion":"9222","creationTimestamp":"2026-03-19T11:51:31Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"8c94f4649"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.13/23\"],\"mac_address\":\"0a:58:0a:80:00:0d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.13/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.13\"\n ],\n \"mac\": \"0a:58:0a:80:00:0d\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-8c94f4649","uid":"a5032ac6-2995-4508-8d5a-040a2a713f5e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-nds54","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-nds54","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c14,c9"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:49Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:12Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:12Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:49Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.13","podIPs":[{"ip":"10.128.0.13"}],"startTime":"2026-03-19T11:52:49Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-03-19T11:56:28Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0319 11:54:37.371261 1 cmd.go:253] Using service-serving-cert provided certificates\nI0319 11:54:37.371435 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0319 11:54:37.372007 1 observer_polling.go:159] Starting file observer\nW0319 11:55:37.379884 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-controller-manager-operator-8c94f4649-6ghdm)\nI0319 11:55:37.380104 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202602261953.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254\nF0319 11:56:07.709080 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-controller-manager-operator/leases/openshift-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-19T11:54:37Z","finishedAt":"2026-03-19T11:56:07Z","containerID":"cri-o://fd8c32d22caf0bf1b1f569479b7d959cb1e7f7190abe63f16601f2e5b50a0711"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","containerID":"cri-o://d37fe7bef4927a9fd81b919a3fab62a0a3e02270254857eb323fe9d818374132","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-nds54","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-config-operator/openshift-config-operator-95bf4f4d-ng9ss.json0000640000000000000000000002206715156762327026663 0ustar0000000000000000{"metadata":{"name":"openshift-config-operator-95bf4f4d-ng9ss","generateName":"openshift-config-operator-95bf4f4d-","namespace":"openshift-config-operator","uid":"a3ceeece-bee9-4fcb-8517-95ebce38e223","resourceVersion":"9313","creationTimestamp":"2026-03-19T11:51:32Z","labels":{"app":"openshift-config-operator","pod-template-hash":"95bf4f4d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.17/23\"],\"mac_address\":\"0a:58:0a:80:00:11\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.17/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.17\"\n ],\n \"mac\": \"0a:58:0a:80:00:11\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-config-operator-95bf4f4d","uid":"c7ffd360-5a70-4a96-aa56-15d11953c5ae","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"config-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"available-featuregates","emptyDir":{"sizeLimit":"100Mi"}},{"name":"kube-api-access-zrgqb","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"openshift-api","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","command":["write-available-featuresets","--asset-output-dir=/available-featuregates","--payload-version=$(OPERATOR_IMAGE_VERSION)"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-zrgqb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"containers":[{"name":"openshift-config-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","command":["cluster-config-operator","operator","--operator-version=$(OPERATOR_IMAGE_VERSION)","--authoritative-feature-gate-dir=/available-featuregates"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.35"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-zrgqb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-config-operator","serviceAccount":"openshift-config-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c2"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:04Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:23Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:23Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:49Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.17","podIPs":[{"ip":"10.128.0.17"}],"startTime":"2026-03-19T11:52:49Z","initContainerStatuses":[{"name":"openshift-api","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-19T11:53:04Z","finishedAt":"2026-03-19T11:53:04Z","containerID":"cri-o://dd209082a1a57426061cd8939f69f004966e7309cc74fc36f14397708b5c4388"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","containerID":"cri-o://dd209082a1a57426061cd8939f69f004966e7309cc74fc36f14397708b5c4388","started":false,"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-zrgqb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"openshift-config-operator","state":{"running":{"startedAt":"2026-03-19T11:57:12Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0319 11:55:54.390121 1 cmd.go:250] Using service-serving-cert provided certificates\nI0319 11:55:54.390299 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0319 11:55:54.390781 1 observer_polling.go:159] Starting file observer\nW0319 11:56:54.397573 1 builder.go:266] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nI0319 11:56:54.397776 1 builder.go:298] config-operator version 4.18.0-202602261953.p2.gfe5e928.assembly.stream.el9-fe5e928-fe5e928628200b49a07aa50e4dfa634fb9452607\nI0319 11:57:12.256500 1 cmd.go:138] Received SIGTERM or SIGINT signal, shutting down controller.\nF0319 11:57:12.256698 1 cmd.go:179] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-config-operator/leases/config-operator-lock\": context canceled\n","startedAt":"2026-03-19T11:55:54Z","finishedAt":"2026-03-19T11:57:12Z","containerID":"cri-o://6face1f4fa1bdc241551919e3ba7726fe31927b0d6796c2e5cb9454a7c5c0bf2"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","containerID":"cri-o://458cf7cd156450c202f524633ff9f83e2511879ffdc708449094125b8667a8bc","started":true,"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-zrgqb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-64854d9cff-764k4.json0000640000000000000000000001670215156762327030134 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-64854d9cff-764k4","generateName":"csi-snapshot-controller-64854d9cff-","namespace":"openshift-cluster-storage-operator","uid":"d625c81e-01cc-424a-997d-546a5204a72b","resourceVersion":"9230","creationTimestamp":"2026-03-19T11:53:06Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"64854d9cff"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.27/23\"],\"mac_address\":\"0a:58:0a:80:00:1b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.27/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.27\"\n ],\n \"mac\": \"0a:58:0a:80:00:1b\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-64854d9cff","uid":"4a189d6e-8e9c-46f5-8413-399fef953e82","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-tgzdh","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-tgzdh","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000170000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c7"},"runAsNonRoot":true,"fsGroup":1000170000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:10Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:06Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:13Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:13Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.27","podIPs":[{"ip":"10.128.0.27"}],"startTime":"2026-03-19T11:53:06Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2026-03-19T11:57:12Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ler-leader\nI0319 11:53:09.833768 1 leader_election.go:184] \"became leader, starting\"\nI0319 11:53:09.833991 1 snapshot_controller_base.go:255] Starting snapshot controller\nI0319 11:53:09.834104 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0319 11:53:09.834137 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0319 11:53:09.837721 1 reflector.go:368] Caches populated for *v1.VolumeSnapshotContent from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI0319 11:53:09.838149 1 reflector.go:368] Caches populated for *v1.VolumeSnapshot from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI0319 11:53:09.838158 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160\nI0319 11:53:09.838246 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160\nI0319 11:53:09.838394 1 reflector.go:368] Caches populated for *v1.VolumeSnapshotClass from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nE0319 11:55:02.394137 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0319 11:56:02.398059 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-storage-operator/snapshot-controller-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io snapshot-controller-leader)\nI0319 11:56:15.390985 1 leaderelection.go:297] failed to renew lease openshift-cluster-storage-operator/snapshot-controller-leader: timed out waiting for the condition\nE0319 11:56:15.391133 1 leader_election.go:188] \"Stopped leading\"\n","startedAt":"2026-03-19T11:53:09Z","finishedAt":"2026-03-19T11:56:15Z","containerID":"cri-o://e21a965ed4cb2dd18edb22058723998ac546681c370497fc8735a2d87bc17971"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","containerID":"cri-o://853d3eee88157502b76c3c9b20b3de3f2808774e2eca0856840a19b4a56c5c18","started":true,"volumeMounts":[{"name":"kube-api-access-tgzdh","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/catalogd-controller-manager-6864dc98f7-xzxpq.json0000640000000000000000000002537715156762327026062 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-6864dc98f7-xzxpq","generateName":"catalogd-controller-manager-6864dc98f7-","namespace":"openshift-catalogd","uid":"376b18a9-5f33-44fd-a37b-20ab02c5e65d","resourceVersion":"9262","creationTimestamp":"2026-03-19T11:53:32Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"6864dc98f7"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.37/23\"],\"mac_address\":\"0a:58:0a:80:00:25\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.37/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.37\"\n ],\n \"mac\": \"0a:58:0a:80:00:25\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-6864dc98f7","uid":"fdcc7f9a-09d4-450e-815f-5a4c6c92e625","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-f2hrw","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-f2hrw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-f2hrw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:44Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:32Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:20Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:20Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:32Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.37","podIPs":[{"ip":"10.128.0.37"}],"startTime":"2026-03-19T11:53:32Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-19T11:53:42Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://bebe23916813176b01b8f4cc2d1e2ed82e08f9e67464ee08d1a4acd826ab717f","started":true,"volumeMounts":[{"name":"kube-api-access-f2hrw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-19T11:57:02Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"shift-redhat-operators\" reconcileID=\"e3f87ddc-073f-401b-983a-6b25181a718f\" layer=0\nI0319 11:55:43.640905 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"e3f87ddc-073f-401b-983a-6b25181a718f\" layer=1\nI0319 11:55:43.841087 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"e3f87ddc-073f-401b-983a-6b25181a718f\" layer=2\nI0319 11:55:46.357795 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"e3f87ddc-073f-401b-983a-6b25181a718f\" layer=3\nI0319 11:55:49.267447 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"e3f87ddc-073f-401b-983a-6b25181a718f\" layer=4\nE0319 11:56:09.521564 1 leaderelection.go:436] error retrieving resource lock openshift-catalogd/catalogd-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io catalogd-operator-lock)\nI0319 11:56:22.513022 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE0319 11:56:22.513128 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-19T11:53:43Z","finishedAt":"2026-03-19T11:56:22Z","containerID":"cri-o://4c09f5575088b49e0ef7e52a5eb347dfd8470474e6a6ff5bf019908a8d6b87bc"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","containerID":"cri-o://2488db84b0849c81166877e395ec16ae06df9df840cc1e0200c1e2aef0f75b5f","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-f2hrw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/node/master-0.json0000640000000000000000000000544615156762327014004 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"41b47749-a7d7-429f-9c0a-3925a76dc079","resourceVersion":"9718","creationTimestamp":"2026-03-19T11:51:30Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/zone-name":"","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{"taints":[{"key":"node-role.kubernetes.io/master","effect":"NoSchedule"}]},"status":{"capacity":{"cpu":"12","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"32865360Ki","pods":"250"},"allocatable":{"cpu":"11500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"31714384Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-03-19T11:57:50Z","lastTransitionTime":"2026-03-19T11:51:30Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-03-19T11:57:50Z","lastTransitionTime":"2026-03-19T11:51:30Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-03-19T11:57:50Z","lastTransitionTime":"2026-03-19T11:51:30Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-03-19T11:57:50Z","lastTransitionTime":"2026-03-19T11:52:49Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.113.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202603021444-0","containerRuntimeVersion":"cri-o://1.31.13-8.rhaos4.18.gitd78977c.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115156762327025312 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"fafc736a-7e75-46ce-b58b-c4c2e0200186","resourceVersion":"4892","generation":2,"creationTimestamp":"2026-03-19T11:47:59Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515156762327026751 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"b0aa0460-328b-448f-a32d-ba331b1e4acf","resourceVersion":"6868","generation":1,"creationTimestamp":"2026-03-19T11:53:54Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"609d5975-851c-4eb5-89fc-223f8c9517c7","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715156762327024037 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"e3cf85f3-6260-4e1b-87a9-6aa139127037","resourceVersion":"4890","generation":2,"creationTimestamp":"2026-03-19T11:51:55Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"609d5975-851c-4eb5-89fc-223f8c9517c7","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537315156762327030652 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"a69f4eaa-514c-4a10-90a6-e9364cea9f0c","resourceVersion":"10155","generation":2,"creationTimestamp":"2026-03-19T11:58:12Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500215156762327032123 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"4ee1614e-061d-441c-95d1-c3f08214af1e","resourceVersion":"10183","generation":2,"creationTimestamp":"2026-03-19T11:58:13Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102715156762327025010 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"5a18a8ed-9be0-4bbf-b610-0ff33e27511b","resourceVersion":"10187","generation":2,"creationTimestamp":"2026-03-19T11:58:13Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615156762327027514 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"2f171370-d1f6-4597-8b60-4193b8f2249f","resourceVersion":"5499","generation":2,"creationTimestamp":"2026-03-19T11:53:27Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/pod/openshift-cluster-version/cluster-version-operator-7d58488df-rcbf8.json0000640000000000000000000001341415156762327026606 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-7d58488df-rcbf8","generateName":"cluster-version-operator-7d58488df-","namespace":"openshift-cluster-version","uid":"dd6ec279-d92f-45c2-97c2-88b96fbd6600","resourceVersion":"8094","creationTimestamp":"2026-03-19T11:53:59Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"7d58488df"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-7d58488df","uid":"a9c75867-cd8f-4a18-9b4b-0bb1a0cb33c3","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:00Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:59Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:00Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:00Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:59Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-19T11:53:59Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-03-19T11:54:00Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","containerID":"cri-o://f3ac0ae0109e7f763509e3a212b55f05f415fede7976cd16c8231233ecd95e88","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415156762327011040 0ustar0000000000000000b1dee834-8800-4c2d-908b-f1e8bf8ba8edconfig/version.json0000640000000000000000000000722715156762327013113 0ustar0000000000000000{"metadata":{"name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","resourceVersion":"10119","generation":2,"creationTimestamp":"2026-03-19T11:47:00Z"},"spec":{"clusterID":"b1dee834-8800-4c2d-908b-f1e8bf8ba8ed","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.35","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","url":"https://access.redhat.com/errata/RHSA-2026:3905","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","fast-4.19","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-03-19T11:47:31Z","completionTime":null,"version":"4.18.35","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","verified":false}],"observedGeneration":2,"versionHash":"Uw6h6T7stl0=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-03-19T11:47:31Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-03-19T11:47:31Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-03-19T11:47:31Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-03-19T11:47:31Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-03-19T11:47:31Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-03-19T11:57:48Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, baremetal, cloud-controller-manager, cloud-credential, cluster-autoscaler, control-plane-machine-set, etcd, image-registry, insights, kube-apiserver, kube-controller-manager, kube-scheduler, machine-api, machine-approver, machine-config, monitoring, openshift-apiserver, openshift-samples, operator-lifecycle-manager-packageserver, storage are not available\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 908): the server is down or not responding\n* Could not update oauthclient \"console\" (550 of 908): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (825 of 908): resource may have been deleted\n* Could not update role \"openshift-console/prometheus-k8s\" (829 of 908): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:47:31Z","reason":"MultipleErrors","message":"Unable to apply 4.18.35: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173615156762327025137 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"15525fc9-9ecd-4844-a231-90a7b3c9821d","resourceVersion":"10037","generation":1,"creationTimestamp":"2026-03-19T11:47:49Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-03-19T11:57:56Z","reason":"SufficientPods","message":""}]}}config/featuregate.json0000640000000000000000000000613615156762327013720 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"086907e1-a1d8-4deb-ba50-95178f0baeca","resourceVersion":"646","generation":1,"creationTimestamp":"2026-03-19T11:47:16Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.35","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315156762327023460 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"f28d0f8b-4b14-468a-b12e-85216d20c51e","resourceVersion":"4070","generation":1,"creationTimestamp":"2026-03-19T11:53:06Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-19T11:53:06Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-19T11:53:06Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-19T11:53:06Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015156762327022063 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"63574d59-ffbe-4ec9-bac9-c9fbd18284c9","resourceVersion":"4052","generation":1,"creationTimestamp":"2026-03-19T11:53:06Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-19T11:53:06Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-19T11:53:06Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-19T11:53:06Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/image.json0000640000000000000000000000111715156762327012500 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"f382b9b5-b9b5-4c58-8034-119def660df0","resourceVersion":"1247","generation":1,"creationTimestamp":"2026-03-19T11:47:42Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002215615156762327025516 0ustar0000000000000000{"metadata":{"name":"edit","uid":"bfc0e7b3-d30e-4467-9ee0-0f413cdba1e4","resourceVersion":"7008","creationTimestamp":"2026-03-19T11:46:01Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002504315156762327025657 0ustar0000000000000000{"metadata":{"name":"admin","uid":"698f34d0-d96f-44f2-8772-1b59c7369629","resourceVersion":"7013","creationTimestamp":"2026-03-19T11:46:01Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115156762327027764 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"0f8d01a5-4739-4ab6-b7c4-385e71f6ebbf","resourceVersion":"6439","generation":1,"creationTimestamp":"2026-03-19T11:53:42Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:53:42Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-03-19T11:53:42Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-03-19T11:53:42Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:42Z","reason":"AsExpected"}]}}config/ingress.json0000640000000000000000000000043615156762327013073 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"a98c5c45-a061-496f-a453-66ecc1485209","resourceVersion":"550","generation":1,"creationTimestamp":"2026-03-19T11:46:55Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/proxy.json0000640000000000000000000000031315156762327012574 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"8587c34e-e6ec-496f-99a1-c69f5174c92e","resourceVersion":"553","generation":1,"creationTimestamp":"2026-03-19T11:46:56Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/schedulers/cluster.json0000640000000000000000000000052415156762327015241 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"ec3313b9-61f8-4f24-805d-fefc89382ba6","resourceVersion":"558","generation":1,"creationTimestamp":"2026-03-19T11:46:57Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215156762327020212 0ustar0000000000000000[]config/authentication.json0000640000000000000000000000132315156762327014434 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"75e251fe-960c-424f-9c2c-72925410b856","resourceVersion":"9374","generation":2,"creationTimestamp":"2026-03-19T11:47:34Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289"}]},"spec":{"type":"","oauthMetadata":{"name":""},"webhookTokenAuthenticator":{"kubeConfig":{"name":"webhook-authentication-integrated-oauth"}},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/infrastructure.json0000640000000000000000000000106515156762327014500 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"a0ee7d6c-1444-497f-93c1-d921306b8a0a","resourceVersion":"535","generation":1,"creationTimestamp":"2026-03-19T11:46:54Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/apiserver.json0000640000000000000000000000121615156762327013416 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"c0aca454-3297-4210-b2d2-67b00b04ee58","resourceVersion":"824","generation":1,"creationTimestamp":"2026-03-19T11:47:32Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/oauth.json0000640000000000000000000000114415156762327012536 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"636f8dbc-e6bb-4655-82d9-1eecb649d436","resourceVersion":"1336","generation":1,"creationTimestamp":"2026-03-19T11:47:45Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f465dca7-e96e-4838-88f3-6a9c73ce9289"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/machineconfigpools/worker.json0000640000000000000000000000106615156762327016601 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-19T11:57:56Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"10016","uid":"e621122e-aa8b-4699-88ca-08a2aa2b70d5"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false}}config/machineconfigpools/master.json0000640000000000000000000000117315156762327016562 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-19T11:57:56Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"10014","uid":"4ef49a2d-0e86-4fbe-aa04-a697e005f121"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false}}config/network.json0000640000000000000000000000117015156762327013106 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"16e29dcc-f548-4f8a-a22d-d95cfe2c8d13","resourceVersion":"3225","generation":2,"creationTimestamp":"2026-03-19T11:46:56Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}