insights-operator/gathers.json0000640000000000000000000003702415153166567015276 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/pdbs","duration_in_ms":29,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":32,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":39,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":39,"records_count":8,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":40,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":21,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":38,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":31,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":25,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":87,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":3,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":10,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":61033,"records_count":0,"errors":["the server was unable to return a response in the time allotted, but may still be processing the request"],"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":171,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":38,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":5,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":9,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":36,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":43,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":59,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":63,"records_count":4,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":14,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":92,"records_count":22,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":100,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":5834,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":9,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":23,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":43,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":322977,"records_count":149,"errors":["function \"support_secret\" failed with an error","function \"pod_network_connectivity_checks\" failed with an error","function \"tsdb_status\" failed with an error","function \"metrics\" failed with an error","function \"active_alerts\" failed with an error","function \"silenced_alerts\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"install_plans\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-k8xgg.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-86d7cdfdfb-xtwpr.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-rz5c8.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-gstfr.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-dn4ll.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-8qznw.json\""],"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":6,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":11,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":12,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":34,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":93,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":61,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":176,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":10,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":30,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":5834,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":24,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":25,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":290724,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":9,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":38,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":15,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":27,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":32,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":52,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":9,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":41,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":56,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":15,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":35,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":119,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":322966,"records_count":43,"errors":["the record with the same name \"config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-k8xgg.json\" was already recorded and had the fingerprint \"e90c3085ed9c5e37b81fbfc78dc35c8cf1f3951efa652242358749c9ca9484b7\", overwriting with the record having fingerprint \"e90c3085ed9c5e37b81fbfc78dc35c8cf1f3951efa652242358749c9ca9484b7\"","the record with the same name \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-86d7cdfdfb-xtwpr.json\" was already recorded and had the fingerprint \"310dfdd2ecbcf586213bdb17e9c88927f7a85af17e6277b7c94913546d614d1b\", overwriting with the record having fingerprint \"76cb93a3a1400d38bbe9cc7d8156eea16b466d81d76ea2def129bce19942fa85\"","the record with the same name \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-rz5c8.json\" was already recorded and had the fingerprint \"cdcaa8bc702e099342bc8aae71b97dd3379bf9f2f57117479aff7754b9bc9566\", overwriting with the record having fingerprint \"07fbb877575fb6feace8235a833da9ef95dfff8dbf1c85b94681d24a5ef09d92\"","the record with the same name \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-gstfr.json\" was already recorded and had the fingerprint \"40c3666a1b817ff2700fb871c1cda2db5caf60afa4446dc4628281d4bd2202e5\", overwriting with the record having fingerprint \"fbbe2acab617e2ce4cb3be8fa9a953a5e97972c3b6dbe16af972cfdc4d9e2144\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-dn4ll.json\" was already recorded and had the fingerprint \"cd8273d4586294224a6f1cc0febfdc3438e3396f540d64a6dae21bfcf0701d68\", overwriting with the record having fingerprint \"d78896d03687199a4e4eade68a2cfc04273652f74ffe53ba9906098f64ab280f\"","the record with the same name \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-8qznw.json\" was already recorded and had the fingerprint \"60f2b1e9a3d004eda2db4754f453e146077400e5f6d1808f6c2eb18d3b472491\", overwriting with the record having fingerprint \"5f3e59da3ac5bf514f189bad223a3e0228e72f87de393f7156c000cc6a5edcd6\""],"warnings":["warning: the record with the same fingerprint \"e90c3085ed9c5e37b81fbfc78dc35c8cf1f3951efa652242358749c9ca9484b7\" was already recorded at path \"config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-k8xgg.json\", recording another one with a different path \"config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-k8xgg.json\""],"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":329.467,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515153166567020001 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515153166567021103 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005742715153166567014273 0ustar0000000000000000{"pods":87,"imageCount":68,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:063b8972231e65eb43f6545ba37804f68138dc54d97b91a652a1c5bc7dc76aa5","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:79984dfbdf9aeae3985c7fd7515e12328775c0e7fc4782929d0998f4dd2a87c6","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b714a7ada1e295b599b432f32e1fd5b74c8cdbe6fe51e95306322b25cb873914","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:e0c034ae18daa01af8d073f8cc24ae4af87883c664304910eab1167fdfd60c0b","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:ae042a5d32eb2f18d537f2068849e665b55df7d8360daedaaeea98bd2a79e769","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":3,"terminalCount":2,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"930btY2ohuPL","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"aC8iSHmKHojh","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","firstCommand":"WFJEBSInAJpw","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9bd0b71d620cf0acbfcd1b58797dc30050bd167cb6b7a7f62c8333dd370c76d5","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":4,"terminalCount":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","firstCommand":"FATPL2W-sitV","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:042e6a37747405da54cf91543d44408c9531327a2cce653c41ca851aa7c896d8","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"Kt0qS5G8piJp":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","firstCommand":"9RqZYN0XQJuD"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b8cb5e0caeca0fb02f3e8c72b7ddf1c49e3c602e42e119ba30c60525f1db1821","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b9b8bc43bac294be3c7669cde049e388ad9d8751242051ba40f83e1c401eceda","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":4,"terminalCount":2,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]},{"restartAlways":false,"containers":[{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"gcNszUTvGLqr"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ebee49810f493f9b566740bd61256fd40b897cc51423f1efa01a02bb57ce177d","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d470dba32064cc62b2ab29303d6e00612304548262eaa2f4e5b40a00a26f71ce","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d470dba32064cc62b2ab29303d6e00612304548262eaa2f4e5b40a00a26f71ce","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:00b591b3820682dc99f16f07a3a0a4ec06dfedba63cd0f79b998ac4509fabea3","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:2508a5f66e509e813cb09825b5456be91b4cdd4d02f470f22a33de42c753f2b7","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":7,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3ef4b76f6b989bf3e802d22aff457a019d9c232f0ea8d927ac6ce2d854fe48d7","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:243ce0f08a360370edf4960aec94fc6c5be9d4aae26cf8c5320adcd047c1b14f","firstArg":"P0uRYWPWnbxt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:3888758fa24689d4e63dfb78ed97a852c687295adcabdabf8cdc4a2beaa42398","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3888758fa24689d4e63dfb78ed97a852c687295adcabdabf8cdc4a2beaa42398","firstCommand":"icTsn2s_EIax","firstArg":"SCcKjYHEPDKM"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:bececf32872455775075a3d35100302396ca58ae29827b24d7df086d8ac14432","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3bedf16a5f527126e934c37d2f24886de4a54c9bd9d45b18821d02eefd8b5f9e","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:bc516f6eb3028f5169f1712ac1878d4b591174fd7c363f4ee5aa63162aa01b0e","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:28f33d62fd0b94c5ea0ebcd7a4216848c8dd671a38d901ce98f4c399b700e1c7","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000011624015153166561034024 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-7fcc847fc6-s2lnw2026-03-08T03:26:42.367093504Z E0308 03:26:42.367055 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:09.926986984Z E0308 03:27:09.925244 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:09.926986984Z E0308 03:27:09.925482 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:09.926986984Z E0308 03:27:09.925625 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:09.926986984Z E0308 03:27:09.925809 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:09.926986984Z E0308 03:27:09.926059 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:10.016421834Z E0308 03:27:10.016343 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:10.021231110Z E0308 03:27:10.021144 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:12.377071278Z E0308 03:27:12.376976 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:12.377282893Z E0308 03:27:12.377211 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:12.377507938Z E0308 03:27:12.377456 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:12.377761545Z E0308 03:27:12.377707 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:12.377761545Z E0308 03:27:12.377748 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:39.945065852Z E0308 03:27:39.944956 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:39.945498142Z E0308 03:27:39.945417 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:39.945817169Z E0308 03:27:39.945729 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:39.946530386Z E0308 03:27:39.946102 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:39.946530386Z E0308 03:27:39.946397 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:42.381578410Z E0308 03:27:42.381474 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:42.382033810Z E0308 03:27:42.381944 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:42.382373698Z E0308 03:27:42.382319 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:42.382416519Z E0308 03:27:42.382399 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:27:42.382612934Z E0308 03:27:42.382485 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:09.903977909Z E0308 03:28:09.900507 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:09.903977909Z E0308 03:28:09.900798 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:09.903977909Z E0308 03:28:09.900993 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:09.903977909Z E0308 03:28:09.901158 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:09.903977909Z E0308 03:28:09.901322 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:10.052983411Z E0308 03:28:10.052864 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:10.060369922Z E0308 03:28:10.060310 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:12.393171618Z E0308 03:28:12.392021 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:12.393171618Z E0308 03:28:12.392199 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:12.393171618Z E0308 03:28:12.392301 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:12.393171618Z E0308 03:28:12.392200 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:12.393171618Z E0308 03:28:12.392499 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:39.894348444Z E0308 03:28:39.894120 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:39.897930306Z E0308 03:28:39.894661 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:39.897930306Z E0308 03:28:39.895002 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:39.900313027Z E0308 03:28:39.899560 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:39.900313027Z E0308 03:28:39.899885 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:42.403987582Z E0308 03:28:42.401782 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:42.403987582Z E0308 03:28:42.402011 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:42.403987582Z E0308 03:28:42.402436 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:42.403987582Z E0308 03:28:42.402871 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:42.403987582Z E0308 03:28:42.403182 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.896005790Z E0308 03:29:09.894984 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.896005790Z E0308 03:29:09.895349 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.896005790Z E0308 03:29:09.895534 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.896069832Z E0308 03:29:09.896006 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.896445682Z E0308 03:29:09.896257 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.947267472Z E0308 03:29:09.946728 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.947512478Z E0308 03:29:09.947486 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.947726444Z E0308 03:29:09.947690 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.947798086Z E0308 03:29:09.947506 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.950208467Z E0308 03:29:09.950094 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:10.002734201Z E0308 03:29:10.002659 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:10.009489544Z E0308 03:29:10.009435 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:12.413565782Z E0308 03:29:12.412829 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:12.413565782Z E0308 03:29:12.413019 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:12.413565782Z E0308 03:29:12.413078 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:12.413565782Z E0308 03:29:12.413090 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:12.413565782Z E0308 03:29:12.413345 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:39.909979217Z E0308 03:29:39.909054 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:39.909979217Z E0308 03:29:39.909450 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:39.909979217Z E0308 03:29:39.909707 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:39.910073540Z E0308 03:29:39.909983 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:39.913983470Z E0308 03:29:39.910251 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:42.421759907Z E0308 03:29:42.421625 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:42.421834709Z E0308 03:29:42.421757 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:42.421938051Z E0308 03:29:42.421852 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:42.422152107Z E0308 03:29:42.422075 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:42.422456355Z E0308 03:29:42.422376 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:00.503617007Z time="2026-03-08T03:30:00Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-08T03:30:00.507116477Z time="2026-03-08T03:30:00Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-08T03:30:09.923580620Z E0308 03:30:09.921884 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:09.925092558Z E0308 03:30:09.925043 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:09.926950196Z E0308 03:30:09.926301 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:09.928101835Z E0308 03:30:09.928047 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:09.928101835Z E0308 03:30:09.928059 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:10.017667800Z E0308 03:30:10.017594 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:10.023645913Z E0308 03:30:10.023591 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:12.434653461Z E0308 03:30:12.434514 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:12.434653461Z E0308 03:30:12.434606 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:12.434942489Z E0308 03:30:12.434845 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:12.435033791Z E0308 03:30:12.434989 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:12.435290357Z E0308 03:30:12.435220 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:23.821959085Z time="2026-03-08T03:30:23Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-08T03:30:23.822749455Z time="2026-03-08T03:30:23Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-08T03:30:25.094364912Z time="2026-03-08T03:30:25Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-08T03:30:25.585866094Z time="2026-03-08T03:30:25Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-08T03:30:39.899053840Z E0308 03:30:39.897862 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.899053840Z E0308 03:30:39.897974 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.899053840Z E0308 03:30:39.898083 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.899053840Z E0308 03:30:39.898190 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.899053840Z E0308 03:30:39.898276 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:42.443543332Z E0308 03:30:42.443479 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:42.444199448Z E0308 03:30:42.444163 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:42.450270871Z E0308 03:30:42.450233 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:42.450450835Z E0308 03:30:42.450397 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:42.451131892Z E0308 03:30:42.451097 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" package-server-manager_current.log0000640000000000000000000000505315153166561037063 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-854648ff6d-8qznw2026-03-08T03:28:21.099527867Z 2026-03-08T03:28:21Z ERROR setup unable to get cluster infrastructure status, using HA cluster values for leader election {"error": "Get \"https://172.30.0.1:443/apis/config.openshift.io/v1/infrastructures/cluster\": context deadline exceeded"} 2026-03-08T03:28:21.099527867Z github.com/openshift/operator-framework-olm/pkg/leaderelection.getLeaderElectionConfig 2026-03-08T03:28:21.099527867Z /build/pkg/leaderelection/leaderelection.go:61 2026-03-08T03:28:21.099527867Z github.com/openshift/operator-framework-olm/pkg/leaderelection.GetLeaderElectionConfig 2026-03-08T03:28:21.099527867Z /build/pkg/leaderelection/leaderelection.go:50 2026-03-08T03:28:21.099527867Z main.run 2026-03-08T03:28:21.099527867Z /build/cmd/package-server-manager/main.go:83 2026-03-08T03:28:21.099527867Z github.com/spf13/cobra.(*Command).execute 2026-03-08T03:28:21.099527867Z /build/vendor/github.com/spf13/cobra/command.go:985 2026-03-08T03:28:21.099527867Z github.com/spf13/cobra.(*Command).ExecuteC 2026-03-08T03:28:21.099527867Z /build/vendor/github.com/spf13/cobra/command.go:1117 2026-03-08T03:28:21.099527867Z github.com/spf13/cobra.(*Command).Execute 2026-03-08T03:28:21.099527867Z /build/vendor/github.com/spf13/cobra/command.go:1041 2026-03-08T03:28:21.099527867Z main.main 2026-03-08T03:28:21.099527867Z /build/cmd/package-server-manager/main.go:43 2026-03-08T03:28:21.099527867Z runtime.main 2026-03-08T03:28:21.099527867Z /usr/lib/golang/src/runtime/proc.go:271 2026-03-08T03:28:21.143385683Z 2026-03-08T03:28:21Z INFO setup starting manager 2026-03-08T03:28:21.146512426Z 2026-03-08T03:28:21Z INFO controller-runtime.metrics Starting metrics server 2026-03-08T03:28:21.146618838Z 2026-03-08T03:28:21Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-03-08T03:28:21.146618838Z 2026-03-08T03:28:21Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-03-08T03:28:21.147524169Z 2026-03-08T03:28:21Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-03-08T03:28:21.149413983Z I0308 03:28:21.149080 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-03-08T03:29:21.158307637Z E0308 03:29:21.158168 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock) kube-rbac-proxy_current.log0000640000000000000000000000160415153166561035564 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-854648ff6d-8qznw2026-03-08T03:11:37.819274525Z W0308 03:11:37.819083 1 deprecated.go:66] 2026-03-08T03:11:37.819274525Z ==== Removed Flag Warning ====================== 2026-03-08T03:11:37.819274525Z 2026-03-08T03:11:37.819274525Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-08T03:11:37.819274525Z 2026-03-08T03:11:37.819274525Z =============================================== 2026-03-08T03:11:37.819274525Z 2026-03-08T03:11:37.819646535Z I0308 03:11:37.819617 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-08T03:11:37.820870377Z I0308 03:11:37.820836 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-08T03:11:37.821123014Z I0308 03:11:37.821103 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-08T03:11:37.821613866Z I0308 03:11:37.821598 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 package-server-manager_previous.log0000640000000000000000000003503715153166561037262 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-854648ff6d-8qznw2026-03-08T03:18:30.905375321Z 2026-03-08T03:18:30Z ERROR setup unable to get cluster infrastructure status, using HA cluster values for leader election {"error": "Get \"https://172.30.0.1:443/apis/config.openshift.io/v1/infrastructures/cluster\": context deadline exceeded"} 2026-03-08T03:18:30.905375321Z github.com/openshift/operator-framework-olm/pkg/leaderelection.getLeaderElectionConfig 2026-03-08T03:18:30.905375321Z /build/pkg/leaderelection/leaderelection.go:61 2026-03-08T03:18:30.905375321Z github.com/openshift/operator-framework-olm/pkg/leaderelection.GetLeaderElectionConfig 2026-03-08T03:18:30.905375321Z /build/pkg/leaderelection/leaderelection.go:50 2026-03-08T03:18:30.905375321Z main.run 2026-03-08T03:18:30.905375321Z /build/cmd/package-server-manager/main.go:83 2026-03-08T03:18:30.905375321Z github.com/spf13/cobra.(*Command).execute 2026-03-08T03:18:30.905375321Z /build/vendor/github.com/spf13/cobra/command.go:985 2026-03-08T03:18:30.905375321Z github.com/spf13/cobra.(*Command).ExecuteC 2026-03-08T03:18:30.905375321Z /build/vendor/github.com/spf13/cobra/command.go:1117 2026-03-08T03:18:30.905375321Z github.com/spf13/cobra.(*Command).Execute 2026-03-08T03:18:30.905375321Z /build/vendor/github.com/spf13/cobra/command.go:1041 2026-03-08T03:18:30.905375321Z main.main 2026-03-08T03:18:30.905375321Z /build/cmd/package-server-manager/main.go:43 2026-03-08T03:18:30.905375321Z runtime.main 2026-03-08T03:18:30.905375321Z /usr/lib/golang/src/runtime/proc.go:271 2026-03-08T03:18:30.952191409Z 2026-03-08T03:18:30Z INFO setup starting manager 2026-03-08T03:18:30.953939395Z 2026-03-08T03:18:30Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-03-08T03:18:30.954092469Z 2026-03-08T03:18:30Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-03-08T03:18:30.954206002Z 2026-03-08T03:18:30Z INFO controller-runtime.metrics Starting metrics server 2026-03-08T03:18:30.955367783Z 2026-03-08T03:18:30Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-03-08T03:18:30.956958435Z I0308 03:18:30.956757 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-03-08T03:23:32.938288642Z I0308 03:23:32.938134 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-03-08T03:23:32.942606214Z 2026-03-08T03:23:32Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-03-08T03:23:32.942676506Z 2026-03-08T03:23:32Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-03-08T03:23:32.943961580Z 2026-03-08T03:23:32Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-03-08T03:23:32.944003601Z 2026-03-08T03:23:32Z DEBUG events package-server-manager-854648ff6d-8qznw_922eedcd-d4a1-42eb-abac-0e0f8126aea1 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"14e2b335-893a-466d-b31f-ec76da1214cd","apiVersion":"coordination.k8s.io/v1","resourceVersion":"10066"}, "reason": "LeaderElection"} 2026-03-08T03:23:33.062542355Z 2026-03-08T03:23:33Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-03-08T03:23:33.065425000Z 2026-03-08T03:23:33Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-03-08T03:23:33.065896132Z 2026-03-08T03:23:33Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T03:23:33.066031876Z 2026-03-08T03:23:33Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:23:33.371026756Z 2026-03-08T03:23:33Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:23:33.371106108Z 2026-03-08T03:23:33Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T03:23:33.430848338Z 2026-03-08T03:23:33Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-08T03:23:33.430848338Z 2026-03-08T03:23:33Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:24:18.083585597Z 2026-03-08T03:24:18Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T03:24:18.083585597Z 2026-03-08T03:24:18Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:24:18.083618268Z 2026-03-08T03:24:18Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:24:18.083651408Z 2026-03-08T03:24:18Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T03:24:18.101078823Z 2026-03-08T03:24:18Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-08T03:24:18.101078823Z 2026-03-08T03:24:18Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:24:18.542952068Z 2026-03-08T03:24:18Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T03:24:18.542952068Z 2026-03-08T03:24:18Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:24:18.542952068Z 2026-03-08T03:24:18Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:24:18.542952068Z 2026-03-08T03:24:18Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T03:24:18.560533936Z 2026-03-08T03:24:18Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-08T03:24:18.560533936Z 2026-03-08T03:24:18Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:24:18.653401911Z 2026-03-08T03:24:18Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T03:24:18.653401911Z 2026-03-08T03:24:18Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:24:18.655409163Z 2026-03-08T03:24:18Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:24:18.655492275Z 2026-03-08T03:24:18Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T03:24:18.670119717Z 2026-03-08T03:24:18Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-08T03:24:18.670119717Z 2026-03-08T03:24:18Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:24:18.727489094Z 2026-03-08T03:24:18Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T03:24:18.727489094Z 2026-03-08T03:24:18Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:24:18.727523645Z 2026-03-08T03:24:18Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:24:18.727553626Z 2026-03-08T03:24:18Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T03:24:18.737134196Z 2026-03-08T03:24:18Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-08T03:24:18.737179487Z 2026-03-08T03:24:18Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:24:18.849753926Z 2026-03-08T03:24:18Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T03:24:18.849753926Z 2026-03-08T03:24:18Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:24:18.849812967Z 2026-03-08T03:24:18Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:24:18.849812967Z 2026-03-08T03:24:18Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T03:24:18.868820344Z 2026-03-08T03:24:18Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-08T03:24:18.868820344Z 2026-03-08T03:24:18Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T03:26:17.025336123Z E0308 03:26:17.025184 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-08T03:27:17.029970459Z E0308 03:27:17.029781 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock) 2026-03-08T03:27:30.008800262Z I0308 03:27:30.008670 1 leaderelection.go:297] failed to renew lease openshift-operator-lifecycle-manager/packageserver-controller-lock: timed out waiting for the condition 2026-03-08T03:28:04.017593791Z E0308 03:28:04.017429 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T03:28:04.018424110Z 2026-03-08T03:28:04Z DEBUG events package-server-manager-854648ff6d-8qznw_922eedcd-d4a1-42eb-abac-0e0f8126aea1 stopped leading {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"14e2b335-893a-466d-b31f-ec76da1214cd","apiVersion":"coordination.k8s.io/v1","resourceVersion":"12074"}, "reason": "LeaderElection"} 2026-03-08T03:28:04.018424110Z 2026-03-08T03:28:04Z INFO Stopping and waiting for non leader election runnables 2026-03-08T03:28:04.018424110Z 2026-03-08T03:28:04Z INFO Stopping and waiting for leader election runnables 2026-03-08T03:28:04.018471051Z 2026-03-08T03:28:04Z INFO Stopping and waiting for caches 2026-03-08T03:28:04.018471051Z 2026-03-08T03:28:04Z INFO Stopping and waiting for webhooks 2026-03-08T03:28:04.018471051Z 2026-03-08T03:28:04Z INFO Stopping and waiting for HTTP servers 2026-03-08T03:28:04.018471051Z 2026-03-08T03:28:04Z INFO Wait completed, proceeding to shutdown the manager 2026-03-08T03:28:04.018607134Z 2026-03-08T03:28:04Z ERROR setup problem running manager {"error": "leader election lost"} 2026-03-08T03:28:04.018607134Z main.run 2026-03-08T03:28:04.018607134Z /build/cmd/package-server-manager/main.go:150 2026-03-08T03:28:04.018607134Z github.com/spf13/cobra.(*Command).execute 2026-03-08T03:28:04.018607134Z /build/vendor/github.com/spf13/cobra/command.go:985 2026-03-08T03:28:04.018607134Z github.com/spf13/cobra.(*Command).ExecuteC 2026-03-08T03:28:04.018607134Z /build/vendor/github.com/spf13/cobra/command.go:1117 2026-03-08T03:28:04.018607134Z github.com/spf13/cobra.(*Command).Execute 2026-03-08T03:28:04.018607134Z /build/vendor/github.com/spf13/cobra/command.go:1041 2026-03-08T03:28:04.018607134Z main.main 2026-03-08T03:28:04.018607134Z /build/cmd/package-server-manager/main.go:43 2026-03-08T03:28:04.018607134Z runtime.main 2026-03-08T03:28:04.018607134Z /usr/lib/golang/src/runtime/proc.go:271 2026-03-08T03:28:04.018700246Z Error: leader election lost 2026-03-08T03:28:04.018760778Z encountered an error while executing the binary: leader election lost config/pod/openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-8qznw.json0000640000000000000000000002335215153166561030317 0ustar0000000000000000{"metadata":{"name":"package-server-manager-854648ff6d-8qznw","generateName":"package-server-manager-854648ff6d-","namespace":"openshift-operator-lifecycle-manager","uid":"f8711b9f-3d18-4b8d-a263-2c9af9dc68a6","resourceVersion":"12209","creationTimestamp":"2026-03-08T03:09:35Z","labels":{"app":"package-server-manager","pod-template-hash":"854648ff6d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.26/23\"],\"mac_address\":\"0a:58:0a:80:00:1a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.26/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.26\"\n ],\n \"mac\": \"0a:58:0a:80:00:1a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"package-server-manager-854648ff6d","uid":"ff4708da-b8ed-4f65-a949-84d53cb9fd52","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"package-server-manager-serving-cert","secret":{"secretName":"package-server-manager-serving-cert","defaultMode":420}},{"name":"kube-api-access-7q68p","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://127.0.0.1:9090/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--logtostderr=true"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"package-server-manager-serving-cert","mountPath":"/etc/tls/private"},{"name":"kube-api-access-7q68p","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}},{"name":"package-server-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","command":["/bin/psm","start"],"args":["--name","$(PACKAGESERVER_NAME)","--namespace","$(PACKAGESERVER_NAMESPACE)","--metrics=:9090"],"env":[{"name":"PACKAGESERVER_NAME","value":"packageserver"},{"name":"PACKAGESERVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8"},{"name":"PACKAGESERVER_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"GOMEMLIMIT","value":"5MiB"}],"resources":{"requests":{"cpu":"10m","memory":"10Mi"}},"volumeMounts":[{"name":"kube-api-access-7q68p","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8080,"scheme":"HTTP"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8080,"scheme":"HTTP"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"olm-operator-serviceaccount","serviceAccount":"olm-operator-serviceaccount","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c20,c10"},"runAsNonRoot":true,"fsGroup":1000400000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:28:56Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:28:56Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.26","podIPs":[{"ip":"10.128.0.26"}],"startTime":"2026-03-08T03:10:53Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-08T03:11:37Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://f3c48cd42f9b900a3418582add786503fcc3f612245b2515c1f6387a810d482a","started":true,"volumeMounts":[{"name":"package-server-manager-serving-cert","mountPath":"/etc/tls/private"},{"name":"kube-api-access-7q68p","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"package-server-manager","state":{"running":{"startedAt":"2026-03-08T03:28:17Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ce lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock)\nI0308 03:27:30.008670 1 leaderelection.go:297] failed to renew lease openshift-operator-lifecycle-manager/packageserver-controller-lock: timed out waiting for the condition\nE0308 03:28:04.017429 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\n2026-03-08T03:28:04Z\tDEBUG\tevents\tpackage-server-manager-854648ff6d-8qznw_922eedcd-d4a1-42eb-abac-0e0f8126aea1 stopped leading\t{\"type\": \"Normal\", \"object\": {\"kind\":\"Lease\",\"namespace\":\"openshift-operator-lifecycle-manager\",\"name\":\"packageserver-controller-lock\",\"uid\":\"14e2b335-893a-466d-b31f-ec76da1214cd\",\"apiVersion\":\"coordination.k8s.io/v1\",\"resourceVersion\":\"12074\"}, \"reason\": \"LeaderElection\"}\n2026-03-08T03:28:04Z\tINFO\tStopping and waiting for non leader election runnables\n2026-03-08T03:28:04Z\tINFO\tStopping and waiting for leader election runnables\n2026-03-08T03:28:04Z\tINFO\tStopping and waiting for caches\n2026-03-08T03:28:04Z\tINFO\tStopping and waiting for webhooks\n2026-03-08T03:28:04Z\tINFO\tStopping and waiting for HTTP servers\n2026-03-08T03:28:04Z\tINFO\tWait completed, proceeding to shutdown the manager\n2026-03-08T03:28:04Z\tERROR\tsetup\tproblem running manager\t{\"error\": \"leader election lost\"}\nmain.run\n\t/build/cmd/package-server-manager/main.go:150\ngithub.com/spf13/cobra.(*Command).execute\n\t/build/vendor/github.com/spf13/cobra/command.go:985\ngithub.com/spf13/cobra.(*Command).ExecuteC\n\t/build/vendor/github.com/spf13/cobra/command.go:1117\ngithub.com/spf13/cobra.(*Command).Execute\n\t/build/vendor/github.com/spf13/cobra/command.go:1041\nmain.main\n\t/build/cmd/package-server-manager/main.go:43\nruntime.main\n\t/usr/lib/golang/src/runtime/proc.go:271\nError: leader election lost\nencountered an error while executing the binary: leader election lost\n","startedAt":"2026-03-08T03:18:27Z","finishedAt":"2026-03-08T03:28:04Z","containerID":"cri-o://c86422caffa4210f8d2d79226aa71c0eb21bf5b4345acfa110f682a6a9383e9a"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","containerID":"cri-o://ab5a7437243a4ead6ec04ee8852468ab2a86f61b936bcca20b78eb0efe80898d","started":true,"volumeMounts":[{"name":"kube-api-access-7q68p","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}olm-operator_current.log0000640000000000000000000005502015153166561033222 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-d64cfc9db-t659n2026-03-08T03:25:33.191070640Z time="2026-03-08T03:25:33Z" level=info msg="install strategy successful" csv=packageserver id=bc40b namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:25:33.289039327Z time="2026-03-08T03:25:33Z" level=info msg="install strategy successful" csv=packageserver id=xJBaG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:25:33.389893279Z time="2026-03-08T03:25:33Z" level=info msg="install strategy successful" csv=packageserver id=hPHpV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:25:33.495641840Z time="2026-03-08T03:25:33Z" level=info msg="install strategy successful" csv=packageserver id=JAtZW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:25:33.589378957Z time="2026-03-08T03:25:33Z" level=info msg="install strategy successful" csv=packageserver id=UXO9i namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:25:33.693617887Z time="2026-03-08T03:25:33Z" level=info msg="install strategy successful" csv=packageserver id=njenX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:25:33.790339962Z time="2026-03-08T03:25:33Z" level=info msg="install strategy successful" csv=packageserver id=RmqWk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:25:33.890139837Z time="2026-03-08T03:25:33Z" level=info msg="install strategy successful" csv=packageserver id=kYoIS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:25:33.990391894Z time="2026-03-08T03:25:33Z" level=info msg="install strategy successful" csv=packageserver id=6Kr0f namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:25:34.092804127Z time="2026-03-08T03:25:34Z" level=info msg="install strategy successful" csv=packageserver id=QysfW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:25:34.193163677Z time="2026-03-08T03:25:34Z" level=info msg="install strategy successful" csv=packageserver id=HYUB6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:25:34.289000569Z time="2026-03-08T03:25:34Z" level=info msg="install strategy successful" csv=packageserver id=L11DU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:25:34.389593634Z time="2026-03-08T03:25:34Z" level=info msg="install strategy successful" csv=packageserver id=y0QLn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:25:34.526765035Z time="2026-03-08T03:25:34Z" level=info msg="install strategy successful" csv=packageserver id=m7k/Y namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:25:34.623925321Z time="2026-03-08T03:25:34Z" level=info msg="install strategy successful" csv=packageserver id=KKHJr namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:25:34.690250242Z time="2026-03-08T03:25:34Z" level=info msg="install strategy successful" csv=packageserver id=agCRk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:25:34.790504009Z time="2026-03-08T03:25:34Z" level=info msg="install strategy successful" csv=packageserver id=dRdU8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:25:34.894621107Z time="2026-03-08T03:25:34Z" level=info msg="install strategy successful" csv=packageserver id=Ly0z/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:26:34.992095315Z time="2026-03-08T03:26:34Z" level=info msg="install strategy successful" csv=packageserver id=e4B5j namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:27:34.993776712Z time="2026-03-08T03:27:34Z" level=error msg="failed to get a client for operator deployment - the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com)" 2026-03-08T03:27:34.993855844Z time="2026-03-08T03:27:34Z" level=error msg="status update error - failed to ensure initial clusteroperator name=operator-lifecycle-manager-packageserver - the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io operator-lifecycle-manager-packageserver)" monitor=clusteroperator 2026-03-08T03:28:34.996872563Z time="2026-03-08T03:28:34Z" level=error msg="failed to get a client for operator deployment - the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com)" 2026-03-08T03:28:34.997471518Z time="2026-03-08T03:28:34Z" level=error msg="status update error - failed to ensure initial clusteroperator name=operator-lifecycle-manager-packageserver - the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io operator-lifecycle-manager-packageserver)" monitor=clusteroperator 2026-03-08T03:30:16.434206156Z time="2026-03-08T03:30:16Z" level=error msg="failed to get a client for operator deployment - the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com)" 2026-03-08T03:30:16.434339230Z time="2026-03-08T03:30:16Z" level=error msg="status update error - failed to ensure initial clusteroperator name=operator-lifecycle-manager-packageserver - the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io operator-lifecycle-manager-packageserver)" monitor=clusteroperator 2026-03-08T03:30:50.321433170Z time="2026-03-08T03:30:50Z" level=warning msg="install timed out" csv=packageserver id=yq9YP namespace=openshift-operator-lifecycle-manager phase=Installing 2026-03-08T03:30:50.321433170Z I0308 03:30:50.320691 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"5ade8fc3-4d50-4cf9-82b6-804da411108a", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"11058", FieldPath:""}): type: 'Warning' reason: 'InstallCheckFailed' install timeout 2026-03-08T03:30:50.431178391Z time="2026-03-08T03:30:50Z" level=warning msg="needs reinstall: apiServices not installed" csv=packageserver id=WHaVT namespace=openshift-operator-lifecycle-manager phase=Failed strategy=deployment 2026-03-08T03:30:50.431251453Z I0308 03:30:50.431190 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"5ade8fc3-4d50-4cf9-82b6-804da411108a", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"12571", FieldPath:""}): type: 'Normal' reason: 'NeedsReinstall' apiServices not installed 2026-03-08T03:30:50.455437579Z time="2026-03-08T03:30:50Z" level=info msg="scheduling ClusterServiceVersion for install" csv=packageserver id=AzOOh namespace=openshift-operator-lifecycle-manager phase=Pending 2026-03-08T03:30:50.455643674Z I0308 03:30:50.455587 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"5ade8fc3-4d50-4cf9-82b6-804da411108a", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"12574", FieldPath:""}): type: 'Normal' reason: 'AllRequirementsMet' all requirements found, attempting install 2026-03-08T03:30:50.520808357Z time="2026-03-08T03:30:50Z" level=warning msg="reusing existing cert packageserver-service-cert" 2026-03-08T03:30:50.588827102Z W0308 03:30:50.588731 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-08T03:30:50.635029261Z I0308 03:30:50.634958 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"5ade8fc3-4d50-4cf9-82b6-804da411108a", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"12577", FieldPath:""}): type: 'Normal' reason: 'InstallSucceeded' waiting for install components to report healthy 2026-03-08T03:30:50.660072308Z time="2026-03-08T03:30:50Z" level=info msg="install strategy successful" csv=packageserver id=+i9FB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:50.660320305Z I0308 03:30:50.660269 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"5ade8fc3-4d50-4cf9-82b6-804da411108a", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"12581", FieldPath:""}): type: 'Normal' reason: 'InstallWaiting' apiServices not installed 2026-03-08T03:30:50.767313456Z time="2026-03-08T03:30:50Z" level=info msg="install strategy successful" csv=packageserver id=Eeo5R namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:50.778028555Z time="2026-03-08T03:30:50Z" level=info msg="install strategy successful" csv=packageserver id=YjgTv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:50.786775584Z time="2026-03-08T03:30:50Z" level=info msg="install strategy successful" csv=packageserver id=ri3PP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:50.794809036Z time="2026-03-08T03:30:50Z" level=info msg="install strategy successful" csv=packageserver id=1ti3E namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:50.802781495Z time="2026-03-08T03:30:50Z" level=info msg="install strategy successful" csv=packageserver id=pGvfB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:50.811773881Z time="2026-03-08T03:30:50Z" level=info msg="install strategy successful" csv=packageserver id=JNxSB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:50.819416122Z time="2026-03-08T03:30:50Z" level=info msg="install strategy successful" csv=packageserver id=U+g8E namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:50.828127061Z time="2026-03-08T03:30:50Z" level=info msg="install strategy successful" csv=packageserver id=jOk8B namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:50.836695956Z time="2026-03-08T03:30:50Z" level=info msg="install strategy successful" csv=packageserver id=EAq8/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:50.844383268Z time="2026-03-08T03:30:50Z" level=info msg="install strategy successful" csv=packageserver id=WT++M namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:50.851016745Z time="2026-03-08T03:30:50Z" level=info msg="install strategy successful" csv=packageserver id=S4oMP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:50.859281752Z time="2026-03-08T03:30:50Z" level=info msg="install strategy successful" csv=packageserver id=FECR5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:50.917463530Z time="2026-03-08T03:30:50Z" level=info msg="install strategy successful" csv=packageserver id=r+lwf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:51.018760299Z time="2026-03-08T03:30:51Z" level=info msg="install strategy successful" csv=packageserver id=8n32Z namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:51.124560301Z time="2026-03-08T03:30:51Z" level=info msg="install strategy successful" csv=packageserver id=xt5pR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:51.220455025Z time="2026-03-08T03:30:51Z" level=info msg="install strategy successful" csv=packageserver id=McMdQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:51.323246522Z time="2026-03-08T03:30:51Z" level=info msg="install strategy successful" csv=packageserver id=Vbeny namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:51.420744896Z time="2026-03-08T03:30:51Z" level=info msg="install strategy successful" csv=packageserver id=oQHbL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:51.521362418Z time="2026-03-08T03:30:51Z" level=info msg="install strategy successful" csv=packageserver id=PUK6e namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:51.617681802Z time="2026-03-08T03:30:51Z" level=info msg="install strategy successful" csv=packageserver id=ddeNp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:51.717469843Z time="2026-03-08T03:30:51Z" level=info msg="install strategy successful" csv=packageserver id=fY63a namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:51.820990948Z time="2026-03-08T03:30:51Z" level=info msg="install strategy successful" csv=packageserver id=sJHoj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:51.919375945Z time="2026-03-08T03:30:51Z" level=info msg="install strategy successful" csv=packageserver id=HIgu8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:52.017946155Z time="2026-03-08T03:30:52Z" level=info msg="install strategy successful" csv=packageserver id=hVvr4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:52.117950192Z time="2026-03-08T03:30:52Z" level=info msg="install strategy successful" csv=packageserver id=KLodh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:52.217822476Z time="2026-03-08T03:30:52Z" level=info msg="install strategy successful" csv=packageserver id=f1dxI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:52.316211282Z time="2026-03-08T03:30:52Z" level=info msg="install strategy successful" csv=packageserver id=eEQ/U namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:52.418117186Z time="2026-03-08T03:30:52Z" level=info msg="install strategy successful" csv=packageserver id=RvdtJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:52.517112148Z time="2026-03-08T03:30:52Z" level=info msg="install strategy successful" csv=packageserver id=KJdv4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:52.616874328Z time="2026-03-08T03:30:52Z" level=info msg="install strategy successful" csv=packageserver id=9KXeQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:52.716673710Z time="2026-03-08T03:30:52Z" level=info msg="install strategy successful" csv=packageserver id=TiMq5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:52.817875687Z time="2026-03-08T03:30:52Z" level=info msg="install strategy successful" csv=packageserver id=Cr+uq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:52.916867878Z time="2026-03-08T03:30:52Z" level=info msg="install strategy successful" csv=packageserver id=KyHyR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:53.017403838Z time="2026-03-08T03:30:53Z" level=info msg="install strategy successful" csv=packageserver id=ljROb namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:53.119881757Z time="2026-03-08T03:30:53Z" level=info msg="install strategy successful" csv=packageserver id=sRZuA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:53.220795557Z time="2026-03-08T03:30:53Z" level=info msg="install strategy successful" csv=packageserver id=O0gNF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:53.316173937Z time="2026-03-08T03:30:53Z" level=info msg="install strategy successful" csv=packageserver id=VS2Y3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:53.423659722Z time="2026-03-08T03:30:53Z" level=info msg="install strategy successful" csv=packageserver id=kQ2G5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:53.523389121Z time="2026-03-08T03:30:53Z" level=info msg="install strategy successful" csv=packageserver id=fx1UF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:53.616142075Z time="2026-03-08T03:30:53Z" level=info msg="install strategy successful" csv=packageserver id=Xua6E namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:53.717244230Z time="2026-03-08T03:30:53Z" level=info msg="install strategy successful" csv=packageserver id=pljtD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:53.816565969Z time="2026-03-08T03:30:53Z" level=info msg="install strategy successful" csv=packageserver id=ON1cX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:53.917466009Z time="2026-03-08T03:30:53Z" level=info msg="install strategy successful" csv=packageserver id=GlVOs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:54.018120902Z time="2026-03-08T03:30:54Z" level=info msg="install strategy successful" csv=packageserver id=2+wT8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:54.118090757Z time="2026-03-08T03:30:54Z" level=info msg="install strategy successful" csv=packageserver id=Lug3t namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:54.216229457Z time="2026-03-08T03:30:54Z" level=info msg="install strategy successful" csv=packageserver id=Rc0/d namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:54.317189758Z time="2026-03-08T03:30:54Z" level=info msg="install strategy successful" csv=packageserver id=ZWS+e namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:54.416604190Z time="2026-03-08T03:30:54Z" level=info msg="install strategy successful" csv=packageserver id=T6T8J namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:54.518238388Z time="2026-03-08T03:30:54Z" level=info msg="install strategy successful" csv=packageserver id=v7Pi3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:54.617194608Z time="2026-03-08T03:30:54Z" level=info msg="install strategy successful" csv=packageserver id=9DdQ2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:54.716626531Z time="2026-03-08T03:30:54Z" level=info msg="install strategy successful" csv=packageserver id=dBPx1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:54.817451238Z time="2026-03-08T03:30:54Z" level=info msg="install strategy successful" csv=packageserver id=QVaAS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:54.917835894Z time="2026-03-08T03:30:54Z" level=info msg="install strategy successful" csv=packageserver id=Oa9T8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:55.017732538Z time="2026-03-08T03:30:55Z" level=info msg="install strategy successful" csv=packageserver id=1Ecv3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:55.116797832Z time="2026-03-08T03:30:55Z" level=info msg="install strategy successful" csv=packageserver id=GGZnh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:55.219042474Z time="2026-03-08T03:30:55Z" level=info msg="install strategy successful" csv=packageserver id=eInQ6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:55.320774094Z time="2026-03-08T03:30:55Z" level=info msg="install strategy successful" csv=packageserver id=XIx0v namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:55.417556190Z time="2026-03-08T03:30:55Z" level=info msg="install strategy successful" csv=packageserver id=Ukr85 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:55.516963972Z time="2026-03-08T03:30:55Z" level=info msg="install strategy successful" csv=packageserver id=cJdY/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:55.617386929Z time="2026-03-08T03:30:55Z" level=info msg="install strategy successful" csv=packageserver id=avRkt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:55.717523990Z time="2026-03-08T03:30:55Z" level=info msg="install strategy successful" csv=packageserver id=XKKdR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:55.817306241Z time="2026-03-08T03:30:55Z" level=info msg="install strategy successful" csv=packageserver id=H5Fky namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:55.917257756Z time="2026-03-08T03:30:55Z" level=info msg="install strategy successful" csv=packageserver id=MueBC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T03:30:56.018318399Z time="2026-03-08T03:30:56Z" level=info msg="install strategy successful" csv=packageserver id=yB80A namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment catalog-operator_current.log0000640000000000000000000003750615153166561035146 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-7d9c49f57b-wsswx2026-03-08T03:30:49.165298941Z time="2026-03-08T03:30:49Z" level=info msg="checking if subscriptions need update" id=r8wIv namespace=openshift-catalogd 2026-03-08T03:30:49.366561046Z time="2026-03-08T03:30:49Z" level=info msg="No subscriptions were found in namespace openshift-user-workload-monitoring" id=SnGnX namespace=openshift-user-workload-monitoring 2026-03-08T03:30:49.366561046Z time="2026-03-08T03:30:49Z" level=info msg="resolving sources" id=wJC6x namespace=openshift-cloud-credential-operator 2026-03-08T03:30:49.366561046Z time="2026-03-08T03:30:49Z" level=info msg="checking if subscriptions need update" id=wJC6x namespace=openshift-cloud-credential-operator 2026-03-08T03:30:49.565407240Z time="2026-03-08T03:30:49Z" level=info msg="No subscriptions were found in namespace openshift-catalogd" id=r8wIv namespace=openshift-catalogd 2026-03-08T03:30:49.565407240Z time="2026-03-08T03:30:49Z" level=info msg="resolving sources" id=0wQDB namespace=openshift-config 2026-03-08T03:30:49.565438011Z time="2026-03-08T03:30:49Z" level=info msg="checking if subscriptions need update" id=0wQDB namespace=openshift-config 2026-03-08T03:30:49.766706036Z time="2026-03-08T03:30:49Z" level=info msg="No subscriptions were found in namespace openshift-cloud-credential-operator" id=wJC6x namespace=openshift-cloud-credential-operator 2026-03-08T03:30:49.766739296Z time="2026-03-08T03:30:49Z" level=info msg="resolving sources" id=gA6ls namespace=openshift-config-operator 2026-03-08T03:30:49.766739296Z time="2026-03-08T03:30:49Z" level=info msg="checking if subscriptions need update" id=gA6ls namespace=openshift-config-operator 2026-03-08T03:30:49.966482842Z time="2026-03-08T03:30:49Z" level=info msg="No subscriptions were found in namespace openshift-config" id=0wQDB namespace=openshift-config 2026-03-08T03:30:49.966511073Z time="2026-03-08T03:30:49Z" level=info msg="resolving sources" id=7KLEO namespace=openshift-insights 2026-03-08T03:30:49.966511073Z time="2026-03-08T03:30:49Z" level=info msg="checking if subscriptions need update" id=7KLEO namespace=openshift-insights 2026-03-08T03:30:50.166651920Z time="2026-03-08T03:30:50Z" level=info msg="No subscriptions were found in namespace openshift-config-operator" id=gA6ls namespace=openshift-config-operator 2026-03-08T03:30:50.166714712Z time="2026-03-08T03:30:50Z" level=info msg="resolving sources" id=KBDFU namespace=openshift-machine-api 2026-03-08T03:30:50.166714712Z time="2026-03-08T03:30:50Z" level=info msg="checking if subscriptions need update" id=KBDFU namespace=openshift-machine-api 2026-03-08T03:30:50.371008172Z time="2026-03-08T03:30:50Z" level=info msg="No subscriptions were found in namespace openshift-insights" id=7KLEO namespace=openshift-insights 2026-03-08T03:30:50.371008172Z time="2026-03-08T03:30:50Z" level=info msg="resolving sources" id=WEOSC namespace=openshift-marketplace 2026-03-08T03:30:50.371008172Z time="2026-03-08T03:30:50Z" level=info msg="checking if subscriptions need update" id=WEOSC namespace=openshift-marketplace 2026-03-08T03:30:50.581019317Z time="2026-03-08T03:30:50Z" level=info msg="No subscriptions were found in namespace openshift-machine-api" id=KBDFU namespace=openshift-machine-api 2026-03-08T03:30:50.581019317Z time="2026-03-08T03:30:50Z" level=info msg="resolving sources" id=zhWLM namespace=kube-system 2026-03-08T03:30:50.581019317Z time="2026-03-08T03:30:50Z" level=info msg="checking if subscriptions need update" id=zhWLM namespace=kube-system 2026-03-08T03:30:50.766703781Z time="2026-03-08T03:30:50Z" level=info msg="No subscriptions were found in namespace openshift-marketplace" id=WEOSC namespace=openshift-marketplace 2026-03-08T03:30:50.766703781Z time="2026-03-08T03:30:50Z" level=info msg="resolving sources" id=F+9+D namespace=openshift-cluster-node-tuning-operator 2026-03-08T03:30:50.766703781Z time="2026-03-08T03:30:50Z" level=info msg="checking if subscriptions need update" id=F+9+D namespace=openshift-cluster-node-tuning-operator 2026-03-08T03:30:50.965749511Z time="2026-03-08T03:30:50Z" level=info msg="No subscriptions were found in namespace kube-system" id=zhWLM namespace=kube-system 2026-03-08T03:30:50.965749511Z time="2026-03-08T03:30:50Z" level=info msg="resolving sources" id=g8M6s namespace=openshift-dns 2026-03-08T03:30:50.965749511Z time="2026-03-08T03:30:50Z" level=info msg="checking if subscriptions need update" id=g8M6s namespace=openshift-dns 2026-03-08T03:30:51.167671322Z time="2026-03-08T03:30:51Z" level=info msg="No subscriptions were found in namespace openshift-cluster-node-tuning-operator" id=F+9+D namespace=openshift-cluster-node-tuning-operator 2026-03-08T03:30:51.167671322Z time="2026-03-08T03:30:51Z" level=info msg="resolving sources" id=U0gv3 namespace=openshift-kube-apiserver-operator 2026-03-08T03:30:51.167671322Z time="2026-03-08T03:30:51Z" level=info msg="checking if subscriptions need update" id=U0gv3 namespace=openshift-kube-apiserver-operator 2026-03-08T03:30:51.366800323Z time="2026-03-08T03:30:51Z" level=info msg="No subscriptions were found in namespace openshift-dns" id=g8M6s namespace=openshift-dns 2026-03-08T03:30:51.366800323Z time="2026-03-08T03:30:51Z" level=info msg="resolving sources" id=qFGUd namespace=openshift-kube-controller-manager 2026-03-08T03:30:51.366861085Z time="2026-03-08T03:30:51Z" level=info msg="checking if subscriptions need update" id=qFGUd namespace=openshift-kube-controller-manager 2026-03-08T03:30:51.566174871Z time="2026-03-08T03:30:51Z" level=info msg="No subscriptions were found in namespace openshift-kube-apiserver-operator" id=U0gv3 namespace=openshift-kube-apiserver-operator 2026-03-08T03:30:51.566174871Z time="2026-03-08T03:30:51Z" level=info msg="resolving sources" id=Vpbms namespace=openshift-ovn-kubernetes 2026-03-08T03:30:51.566235633Z time="2026-03-08T03:30:51Z" level=info msg="checking if subscriptions need update" id=Vpbms namespace=openshift-ovn-kubernetes 2026-03-08T03:30:51.769475317Z time="2026-03-08T03:30:51Z" level=info msg="No subscriptions were found in namespace openshift-kube-controller-manager" id=qFGUd namespace=openshift-kube-controller-manager 2026-03-08T03:30:51.769475317Z time="2026-03-08T03:30:51Z" level=info msg="resolving sources" id=6hwLL namespace=default 2026-03-08T03:30:51.769527138Z time="2026-03-08T03:30:51Z" level=info msg="checking if subscriptions need update" id=6hwLL namespace=default 2026-03-08T03:30:51.967194353Z time="2026-03-08T03:30:51Z" level=info msg="No subscriptions were found in namespace openshift-ovn-kubernetes" id=Vpbms namespace=openshift-ovn-kubernetes 2026-03-08T03:30:51.967194353Z time="2026-03-08T03:30:51Z" level=info msg="resolving sources" id=iXdA2 namespace=openshift-cluster-version 2026-03-08T03:30:51.967194353Z time="2026-03-08T03:30:51Z" level=info msg="checking if subscriptions need update" id=iXdA2 namespace=openshift-cluster-version 2026-03-08T03:30:52.169035343Z time="2026-03-08T03:30:52Z" level=info msg="No subscriptions were found in namespace default" id=6hwLL namespace=default 2026-03-08T03:30:52.169035343Z time="2026-03-08T03:30:52Z" level=info msg="resolving sources" id=wnDRY namespace=openshift-node 2026-03-08T03:30:52.169035343Z time="2026-03-08T03:30:52Z" level=info msg="checking if subscriptions need update" id=wnDRY namespace=openshift-node 2026-03-08T03:30:52.366731728Z time="2026-03-08T03:30:52Z" level=info msg="No subscriptions were found in namespace openshift-cluster-version" id=iXdA2 namespace=openshift-cluster-version 2026-03-08T03:30:52.366731728Z time="2026-03-08T03:30:52Z" level=info msg="resolving sources" id=bvfeQ namespace=openshift-ingress-canary 2026-03-08T03:30:52.366731728Z time="2026-03-08T03:30:52Z" level=info msg="checking if subscriptions need update" id=bvfeQ namespace=openshift-ingress-canary 2026-03-08T03:30:52.565264425Z time="2026-03-08T03:30:52Z" level=info msg="No subscriptions were found in namespace openshift-node" id=wnDRY namespace=openshift-node 2026-03-08T03:30:52.565264425Z time="2026-03-08T03:30:52Z" level=info msg="resolving sources" id=QnMkQ namespace=openshift-cloud-controller-manager-operator 2026-03-08T03:30:52.565264425Z time="2026-03-08T03:30:52Z" level=info msg="checking if subscriptions need update" id=QnMkQ namespace=openshift-cloud-controller-manager-operator 2026-03-08T03:30:52.765668008Z time="2026-03-08T03:30:52Z" level=info msg="No subscriptions were found in namespace openshift-ingress-canary" id=bvfeQ namespace=openshift-ingress-canary 2026-03-08T03:30:52.765699689Z time="2026-03-08T03:30:52Z" level=info msg="resolving sources" id=1EKeM namespace=openshift-ingress-operator 2026-03-08T03:30:52.765699689Z time="2026-03-08T03:30:52Z" level=info msg="checking if subscriptions need update" id=1EKeM namespace=openshift-ingress-operator 2026-03-08T03:30:52.966019320Z time="2026-03-08T03:30:52Z" level=info msg="No subscriptions were found in namespace openshift-cloud-controller-manager-operator" id=QnMkQ namespace=openshift-cloud-controller-manager-operator 2026-03-08T03:30:52.966019320Z time="2026-03-08T03:30:52Z" level=info msg="resolving sources" id=eTkJA namespace=openshift-kube-scheduler 2026-03-08T03:30:52.966019320Z time="2026-03-08T03:30:52Z" level=info msg="checking if subscriptions need update" id=eTkJA namespace=openshift-kube-scheduler 2026-03-08T03:30:53.170605938Z time="2026-03-08T03:30:53Z" level=info msg="No subscriptions were found in namespace openshift-ingress-operator" id=1EKeM namespace=openshift-ingress-operator 2026-03-08T03:30:53.170647800Z time="2026-03-08T03:30:53Z" level=info msg="resolving sources" id=wLGS5 namespace=openshift-kube-scheduler-operator 2026-03-08T03:30:53.170647800Z time="2026-03-08T03:30:53Z" level=info msg="checking if subscriptions need update" id=wLGS5 namespace=openshift-kube-scheduler-operator 2026-03-08T03:30:53.366321744Z time="2026-03-08T03:30:53Z" level=info msg="No subscriptions were found in namespace openshift-kube-scheduler" id=eTkJA namespace=openshift-kube-scheduler 2026-03-08T03:30:53.366321744Z time="2026-03-08T03:30:53Z" level=info msg="resolving sources" id=oGP+v namespace=openshift-network-diagnostics 2026-03-08T03:30:53.366321744Z time="2026-03-08T03:30:53Z" level=info msg="checking if subscriptions need update" id=oGP+v namespace=openshift-network-diagnostics 2026-03-08T03:30:53.567515717Z time="2026-03-08T03:30:53Z" level=info msg="No subscriptions were found in namespace openshift-kube-scheduler-operator" id=wLGS5 namespace=openshift-kube-scheduler-operator 2026-03-08T03:30:53.567551207Z time="2026-03-08T03:30:53Z" level=info msg="resolving sources" id=nMXxs namespace=openshift 2026-03-08T03:30:53.567551207Z time="2026-03-08T03:30:53Z" level=info msg="checking if subscriptions need update" id=nMXxs namespace=openshift 2026-03-08T03:30:53.767971091Z time="2026-03-08T03:30:53Z" level=info msg="No subscriptions were found in namespace openshift-network-diagnostics" id=oGP+v namespace=openshift-network-diagnostics 2026-03-08T03:30:53.767971091Z time="2026-03-08T03:30:53Z" level=info msg="resolving sources" id=e4GFT namespace=openshift-image-registry 2026-03-08T03:30:53.767971091Z time="2026-03-08T03:30:53Z" level=info msg="checking if subscriptions need update" id=e4GFT namespace=openshift-image-registry 2026-03-08T03:30:53.966732993Z time="2026-03-08T03:30:53Z" level=info msg="No subscriptions were found in namespace openshift" id=nMXxs namespace=openshift 2026-03-08T03:30:53.966732993Z time="2026-03-08T03:30:53Z" level=info msg="resolving sources" id=CZnm8 namespace=openshift-kni-infra 2026-03-08T03:30:53.966732993Z time="2026-03-08T03:30:53Z" level=info msg="checking if subscriptions need update" id=CZnm8 namespace=openshift-kni-infra 2026-03-08T03:30:54.176346048Z time="2026-03-08T03:30:54Z" level=info msg="No subscriptions were found in namespace openshift-image-registry" id=e4GFT namespace=openshift-image-registry 2026-03-08T03:30:54.176346048Z time="2026-03-08T03:30:54Z" level=info msg="resolving sources" id=MnPda namespace=openshift-kube-apiserver 2026-03-08T03:30:54.176346048Z time="2026-03-08T03:30:54Z" level=info msg="checking if subscriptions need update" id=MnPda namespace=openshift-kube-apiserver 2026-03-08T03:30:54.365995872Z time="2026-03-08T03:30:54Z" level=info msg="No subscriptions were found in namespace openshift-kni-infra" id=CZnm8 namespace=openshift-kni-infra 2026-03-08T03:30:54.365995872Z time="2026-03-08T03:30:54Z" level=info msg="resolving sources" id=e72qz namespace=openshift-network-node-identity 2026-03-08T03:30:54.365995872Z time="2026-03-08T03:30:54Z" level=info msg="checking if subscriptions need update" id=e72qz namespace=openshift-network-node-identity 2026-03-08T03:30:54.565816840Z time="2026-03-08T03:30:54Z" level=info msg="No subscriptions were found in namespace openshift-kube-apiserver" id=MnPda namespace=openshift-kube-apiserver 2026-03-08T03:30:54.565816840Z time="2026-03-08T03:30:54Z" level=info msg="resolving sources" id=Qel9q namespace=openshift-operator-controller 2026-03-08T03:30:54.565816840Z time="2026-03-08T03:30:54Z" level=info msg="checking if subscriptions need update" id=Qel9q namespace=openshift-operator-controller 2026-03-08T03:30:54.765605258Z time="2026-03-08T03:30:54Z" level=info msg="No subscriptions were found in namespace openshift-network-node-identity" id=e72qz namespace=openshift-network-node-identity 2026-03-08T03:30:54.765605258Z time="2026-03-08T03:30:54Z" level=info msg="resolving sources" id=kMv+j namespace=openshift-cluster-samples-operator 2026-03-08T03:30:54.765605258Z time="2026-03-08T03:30:54Z" level=info msg="checking if subscriptions need update" id=kMv+j namespace=openshift-cluster-samples-operator 2026-03-08T03:30:54.968005382Z time="2026-03-08T03:30:54Z" level=info msg="No subscriptions were found in namespace openshift-operator-controller" id=Qel9q namespace=openshift-operator-controller 2026-03-08T03:30:54.968005382Z time="2026-03-08T03:30:54Z" level=info msg="resolving sources" id=owitK namespace=openshift-controller-manager-operator 2026-03-08T03:30:54.968005382Z time="2026-03-08T03:30:54Z" level=info msg="checking if subscriptions need update" id=owitK namespace=openshift-controller-manager-operator 2026-03-08T03:30:55.166875447Z time="2026-03-08T03:30:55Z" level=info msg="No subscriptions were found in namespace openshift-cluster-samples-operator" id=kMv+j namespace=openshift-cluster-samples-operator 2026-03-08T03:30:55.166875447Z time="2026-03-08T03:30:55Z" level=info msg="resolving sources" id=7JjKg namespace=openshift-network-operator 2026-03-08T03:30:55.166875447Z time="2026-03-08T03:30:55Z" level=info msg="checking if subscriptions need update" id=7JjKg namespace=openshift-network-operator 2026-03-08T03:30:55.365834484Z time="2026-03-08T03:30:55Z" level=info msg="No subscriptions were found in namespace openshift-controller-manager-operator" id=owitK namespace=openshift-controller-manager-operator 2026-03-08T03:30:55.365834484Z time="2026-03-08T03:30:55Z" level=info msg="resolving sources" id=NhxBs namespace=openshift-route-controller-manager 2026-03-08T03:30:55.365834484Z time="2026-03-08T03:30:55Z" level=info msg="checking if subscriptions need update" id=NhxBs namespace=openshift-route-controller-manager 2026-03-08T03:30:55.568218797Z time="2026-03-08T03:30:55Z" level=info msg="No subscriptions were found in namespace openshift-network-operator" id=7JjKg namespace=openshift-network-operator 2026-03-08T03:30:55.568218797Z time="2026-03-08T03:30:55Z" level=info msg="resolving sources" id=8zIWn namespace=openshift-vsphere-infra 2026-03-08T03:30:55.568218797Z time="2026-03-08T03:30:55Z" level=info msg="checking if subscriptions need update" id=8zIWn namespace=openshift-vsphere-infra 2026-03-08T03:30:55.766292362Z time="2026-03-08T03:30:55Z" level=info msg="No subscriptions were found in namespace openshift-route-controller-manager" id=NhxBs namespace=openshift-route-controller-manager 2026-03-08T03:30:55.766329273Z time="2026-03-08T03:30:55Z" level=info msg="resolving sources" id=lf7xY namespace=openshift-apiserver 2026-03-08T03:30:55.766329273Z time="2026-03-08T03:30:55Z" level=info msg="checking if subscriptions need update" id=lf7xY namespace=openshift-apiserver config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-dn4ll/etcd-operator_current.log0000640000000000000000000001055315153166561031140 0ustar00000000000000002026-03-08T03:30:19.080713638Z I0308 03:30:19.080411 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-03-08T03:30:19.080888272Z I0308 03:30:19.080828 1 observer_polling.go:159] Starting file observer 2026-03-08T03:30:19.081401015Z I0308 03:30:19.081337 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-08T03:30:19.081733074Z I0308 03:30:19.081407 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-08T03:30:19.082780611Z I0308 03:30:19.082709 1 observer_polling.go:159] Starting file observer 2026-03-08T03:30:36.355870023Z I0308 03:30:36.353232 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602170912.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934 2026-03-08T03:30:36.959167999Z I0308 03:30:36.957309 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-08T03:30:36.959167999Z W0308 03:30:36.957368 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T03:30:36.959167999Z W0308 03:30:36.957377 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T03:30:36.959167999Z W0308 03:30:36.957383 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-08T03:30:36.959167999Z W0308 03:30:36.957392 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-08T03:30:36.959167999Z W0308 03:30:36.957397 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-08T03:30:36.959167999Z W0308 03:30:36.957402 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-08T03:30:36.964079585Z I0308 03:30:36.963763 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-08T03:30:36.964136896Z I0308 03:30:36.964125 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... 2026-03-08T03:30:36.965502231Z I0308 03:30:36.965426 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-08T03:30:36.965502231Z I0308 03:30:36.965479 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-08T03:30:36.965532692Z I0308 03:30:36.965521 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-08T03:30:36.983337878Z I0308 03:30:36.983148 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-08T03:30:36.983362299Z I0308 03:30:36.965565 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-08T03:30:36.983761359Z I0308 03:30:36.983722 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T03:30:36.983761359Z I0308 03:30:36.983742 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T03:30:36.988107990Z I0308 03:30:36.986838 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T03:30:36.988107990Z I0308 03:30:36.986856 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T03:30:37.077456889Z I0308 03:30:37.073653 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-08T03:30:37.085107015Z I0308 03:30:37.085031 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T03:30:37.096004084Z I0308 03:30:37.087019 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-dn4ll/etcd-operator_previous.log0000640000000000000000000006652515153166561031344 0ustar00000000000000002026-03-08T03:26:14.117634745Z I0308 03:26:14.117513 1 etcdcli_pool.go:157] closing cached client 2026-03-08T03:26:14.210966891Z W0308 03:26:14.210862 1 etcdcli_pool.go:94] cached client considered unhealthy after 0 tries, trying again. Err: error during cache client health connection check: context deadline exceeded 2026-03-08T03:26:14.210966891Z I0308 03:26:14.210900 1 etcdcli_pool.go:157] closing cached client 2026-03-08T03:26:16.119123418Z I0308 03:26:16.118992 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:26:16.211858249Z I0308 03:26:16.211735 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:26:17.987638351Z E0308 03:26:17.987534 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-08T03:26:31.121329365Z W0308 03:26:31.121211 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:26:31.213672015Z W0308 03:26:31.213554 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:26:35.133755581Z I0308 03:26:35.133492 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:26:35.214232943Z I0308 03:26:35.214131 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:26:44.015784109Z I0308 03:26:44.015671 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:26:44.023310752Z E0308 03:26:44.023190 1 base_controller.go:279] "Unhandled Error" err="FSyncController reconciliation failed: Post \"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/query\": dial tcp 172.30.89.251:9091: connect: connection refused" 2026-03-08T03:26:44.107937404Z E0308 03:26:44.107798 1 base_controller.go:279] "Unhandled Error" err="etcd-InstallerState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" 2026-03-08T03:26:44.817968465Z E0308 03:26:44.817835 1 base_controller.go:279] "Unhandled Error" err="EtcdCertSignerController reconciliation failed: could not get current etcd-all-bundles configmap the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-all-bundles)" 2026-03-08T03:26:46.119842691Z W0308 03:26:46.119720 1 etcdcli_pool.go:94] cached client considered unhealthy after 1 tries, trying again. Err: error during cache client health connection check: context deadline exceeded 2026-03-08T03:26:46.119842691Z I0308 03:26:46.119765 1 etcdcli_pool.go:157] closing cached client 2026-03-08T03:26:50.120803946Z I0308 03:26:50.120688 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:26:50.135094323Z W0308 03:26:50.135010 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:26:50.216242971Z W0308 03:26:50.216162 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:26:50.216295892Z E0308 03:26:50.216234 1 base_controller.go:279] "Unhandled Error" err="BootstrapTeardownController reconciliation failed: error while canRemoveEtcdBootstrap: giving up getting a cached client after 3 tries" 2026-03-08T03:26:50.217923062Z I0308 03:26:50.217859 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:26:59.016992840Z W0308 03:26:59.016876 1 etcdcli_pool.go:73] could not create a new cached client after 0 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:27:01.017482218Z I0308 03:27:01.017323 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:27:05.122559199Z W0308 03:27:05.122415 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:27:05.219279635Z W0308 03:27:05.219178 1 etcdcli_pool.go:73] could not create a new cached client after 0 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:27:07.219880199Z I0308 03:27:07.219733 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:27:16.018941778Z W0308 03:27:16.018822 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:27:17.989547762Z E0308 03:27:17.989414 1 leaderelection.go:436] error retrieving resource lock openshift-etcd-operator/openshift-cluster-etcd-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io openshift-cluster-etcd-operator-lock) 2026-03-08T03:27:18.113937379Z E0308 03:27:18.113838 1 base_controller.go:279] "Unhandled Error" err="etcd-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"etcd-StaticPodState\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-03-08T03:27:18.114088043Z E0308 03:27:18.114032 1 base_controller.go:279] "Unhandled Error" err="ScriptController reconciliation failed: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)" 2026-03-08T03:27:18.114479302Z I0308 03:27:18.114425 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"1e2378d0-368c-46ca-a26c-b6051380ab1c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ScriptControllerErrorUpdatingStatus' Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T03:27:20.019107246Z I0308 03:27:20.018972 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:27:22.221093992Z W0308 03:27:22.220982 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:27:24.141181509Z W0308 03:27:24.141040 1 base_controller.go:242] Updating status of "ClusterMemberController" failed: unable to ApplyStatus for operator using fieldManager "ClusterMemberController-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T03:27:24.141181509Z E0308 03:27:24.141127 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberController reconciliation failed: could not get list of unhealthy members: giving up getting a cached client after 3 tries" 2026-03-08T03:27:24.142444588Z I0308 03:27:24.142368 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:27:26.221666399Z I0308 03:27:26.221589 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:27:35.022308273Z W0308 03:27:35.022205 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:27:39.128592249Z E0308 03:27:39.128487 1 base_controller.go:279] "Unhandled Error" err="EtcdEndpointsController reconciliation failed: failed to get member list: giving up getting a cached client after 3 tries" 2026-03-08T03:27:39.128592249Z I0308 03:27:39.128537 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"1e2378d0-368c-46ca-a26c-b6051380ab1c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'EtcdEndpointsErrorUpdatingStatus' Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T03:27:39.129842538Z I0308 03:27:39.129784 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:27:39.143869163Z W0308 03:27:39.143811 1 etcdcli_pool.go:73] could not create a new cached client after 0 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:27:41.144694999Z I0308 03:27:41.144565 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:27:41.222657525Z W0308 03:27:41.222571 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:27:41.222657525Z E0308 03:27:41.222636 1 base_controller.go:279] "Unhandled Error" err="BootstrapTeardownController reconciliation failed: error while canRemoveEtcdBootstrap: giving up getting a cached client after 3 tries" 2026-03-08T03:27:41.224207661Z I0308 03:27:41.224167 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:27:44.023757816Z E0308 03:27:44.023646 1 base_controller.go:279] "Unhandled Error" err="FSyncController reconciliation failed: Post \"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/query\": dial tcp 172.30.89.251:9091: connect: connection refused" 2026-03-08T03:27:44.111984380Z E0308 03:27:44.111814 1 base_controller.go:279] "Unhandled Error" err="etcd-InstallerState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" 2026-03-08T03:27:44.820499421Z E0308 03:27:44.820328 1 base_controller.go:279] "Unhandled Error" err="EtcdCertSignerController reconciliation failed: could not get current etcd-all-bundles configmap the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-all-bundles)" 2026-03-08T03:27:52.118603971Z E0308 03:27:52.118462 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{etcd-operator.189abfef5db58d48 openshift-etcd-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-etcd-operator,Name:etcd-operator,UID:1e2378d0-368c-46ca-a26c-b6051380ab1c,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:ScriptControllerErrorUpdatingStatus,Message:Timeout: request did not complete within requested timeout - context deadline exceeded,Source:EventSource{Component:openshift-cluster-etcd-operator-script-controller-scriptcontroller,Host:,},FirstTimestamp:2026-03-08 03:27:18.11397972 +0000 UTC m=+525.599448664,LastTimestamp:2026-03-08 03:27:18.11397972 +0000 UTC m=+525.599448664,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:openshift-cluster-etcd-operator-script-controller-scriptcontroller,ReportingInstance:,}" 2026-03-08T03:27:54.131459749Z W0308 03:27:54.131306 1 etcdcli_pool.go:73] could not create a new cached client after 0 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:27:56.131858606Z I0308 03:27:56.131778 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:27:56.146043514Z W0308 03:27:56.145974 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:27:56.225623938Z W0308 03:27:56.225532 1 etcdcli_pool.go:73] could not create a new cached client after 0 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:27:58.225846080Z I0308 03:27:58.225777 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:28:00.147215638Z I0308 03:28:00.147090 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:28:09.028370457Z E0308 03:28:09.028232 1 base_controller.go:279] "Unhandled Error" err="EtcdMembersController reconciliation failed: giving up getting a cached client after 3 tries" 2026-03-08T03:28:09.028370457Z I0308 03:28:09.028331 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"1e2378d0-368c-46ca-a26c-b6051380ab1c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ReportEtcdMembersErrorUpdatingStatus' Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T03:28:09.029561125Z I0308 03:28:09.029472 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:28:11.133220123Z W0308 03:28:11.133069 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:28:13.131377936Z E0308 03:28:13.131303 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{etcd-operator.189abff442446ff7 openshift-etcd-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-etcd-operator,Name:etcd-operator,UID:1e2378d0-368c-46ca-a26c-b6051380ab1c,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:EtcdEndpointsErrorUpdatingStatus,Message:Timeout: request did not complete within requested timeout - context deadline exceeded,Source:EventSource{Component:openshift-cluster-etcd-operator-etcd-endpoints-controller-etcdendpointscontroller,Host:,},FirstTimestamp:2026-03-08 03:27:39.128418295 +0000 UTC m=+546.613887269,LastTimestamp:2026-03-08 03:27:39.128418295 +0000 UTC m=+546.613887269,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:openshift-cluster-etcd-operator-etcd-endpoints-controller-etcdendpointscontroller,ReportingInstance:,}" 2026-03-08T03:28:13.227519903Z W0308 03:28:13.227421 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:28:15.133289499Z I0308 03:28:15.133203 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:28:15.154227444Z W0308 03:28:15.154154 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:28:17.228600583Z I0308 03:28:17.228510 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:28:18.116449379Z E0308 03:28:18.116384 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa), \"manifests/installer-cluster-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:openshift-etcd-installer), unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": Timeout: request did not complete within requested timeout - context deadline exceeded]" 2026-03-08T03:28:18.127956245Z E0308 03:28:18.125952 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-03-08T03:28:24.030531698Z W0308 03:28:24.030417 1 etcdcli_pool.go:73] could not create a new cached client after 0 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:28:26.030998605Z I0308 03:28:26.030882 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:28:30.135434356Z W0308 03:28:30.135341 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:28:32.230391724Z W0308 03:28:32.230324 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:28:32.230446855Z E0308 03:28:32.230399 1 base_controller.go:279] "Unhandled Error" err="BootstrapTeardownController reconciliation failed: error while canRemoveEtcdBootstrap: giving up getting a cached client after 3 tries" 2026-03-08T03:28:32.231779709Z I0308 03:28:32.231734 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:28:41.032078883Z W0308 03:28:41.032009 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:28:43.032319148Z E0308 03:28:43.032218 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{etcd-operator.189abffb386eba6f openshift-etcd-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-etcd-operator,Name:etcd-operator,UID:1e2378d0-368c-46ca-a26c-b6051380ab1c,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:ReportEtcdMembersErrorUpdatingStatus,Message:Timeout: request did not complete within requested timeout - context deadline exceeded,Source:EventSource{Component:openshift-cluster-etcd-operator-member-observer-controller-etcdmemberscontroller,Host:,},FirstTimestamp:2026-03-08 03:28:09.028188783 +0000 UTC m=+576.513657717,LastTimestamp:2026-03-08 03:28:09.028188783 +0000 UTC m=+576.513657717,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:openshift-cluster-etcd-operator-member-observer-controller-etcdmemberscontroller,ReportingInstance:,}" 2026-03-08T03:28:44.023380094Z E0308 03:28:44.023299 1 base_controller.go:279] "Unhandled Error" err="FSyncController reconciliation failed: Post \"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/query\": dial tcp 172.30.89.251:9091: connect: connection refused" 2026-03-08T03:28:44.115276835Z E0308 03:28:44.115199 1 base_controller.go:279] "Unhandled Error" err="etcd-InstallerState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" 2026-03-08T03:28:44.824037077Z E0308 03:28:44.823987 1 base_controller.go:279] "Unhandled Error" err="EtcdCertSignerController reconciliation failed: could not get current etcd-all-bundles configmap the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-all-bundles)" 2026-03-08T03:28:45.032474550Z I0308 03:28:45.032387 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:28:47.233299017Z W0308 03:28:47.233197 1 etcdcli_pool.go:73] could not create a new cached client after 0 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T03:28:47.740158205Z I0308 03:28:47.740027 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T03:28:49.160360830Z W0308 03:28:49.160238 1 base_controller.go:242] Updating status of "ClusterMemberController" failed: unable to ApplyStatus for operator using fieldManager "ClusterMemberController-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T03:28:49.160360830Z E0308 03:28:49.160313 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberController reconciliation failed: could not get list of unhealthy members: giving up getting a cached client after 3 tries" 2026-03-08T03:28:49.967075160Z E0308 03:28:49.966998 1 base_controller.go:279] "Unhandled Error" err="FSyncController reconciliation failed: Post \"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/query\": dial tcp 172.30.89.251:9091: connect: connection refused" 2026-03-08T03:28:51.993568396Z E0308 03:28:51.993486 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-08T03:28:52.123660354Z E0308 03:28:52.123578 1 base_controller.go:279] "Unhandled Error" err="ScriptController reconciliation failed: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)" 2026-03-08T03:28:52.123736506Z I0308 03:28:52.123680 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"1e2378d0-368c-46ca-a26c-b6051380ab1c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ScriptControllerErrorUpdatingStatus' Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T03:28:52.126119607Z E0308 03:28:52.126071 1 base_controller.go:279] "Unhandled Error" err="etcd-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"etcd-StaticPodState\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-03-08T03:29:04.140846040Z E0308 03:29:04.140695 1 base_controller.go:279] "Unhandled Error" err="EtcdEndpointsController reconciliation failed: failed to get member list: giving up getting a cached client after 3 tries" 2026-03-08T03:29:04.140974533Z I0308 03:29:04.140820 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"1e2378d0-368c-46ca-a26c-b6051380ab1c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'EtcdEndpointsErrorUpdatingStatus' Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T03:29:26.127116122Z E0308 03:29:26.127003 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{etcd-operator.189abfef5db58d48 openshift-etcd-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-etcd-operator,Name:etcd-operator,UID:1e2378d0-368c-46ca-a26c-b6051380ab1c,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:ScriptControllerErrorUpdatingStatus,Message:Timeout: request did not complete within requested timeout - context deadline exceeded,Source:EventSource{Component:openshift-cluster-etcd-operator-script-controller-scriptcontroller,Host:,},FirstTimestamp:2026-03-08 03:27:18.11397972 +0000 UTC m=+525.599448664,LastTimestamp:2026-03-08 03:28:52.123516311 +0000 UTC m=+619.608985275,Count:2,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:openshift-cluster-etcd-operator-script-controller-scriptcontroller,ReportingInstance:,}" 2026-03-08T03:29:38.146130499Z E0308 03:29:38.146025 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{etcd-operator.189abff442446ff7 openshift-etcd-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-etcd-operator,Name:etcd-operator,UID:1e2378d0-368c-46ca-a26c-b6051380ab1c,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:EtcdEndpointsErrorUpdatingStatus,Message:Timeout: request did not complete within requested timeout - context deadline exceeded,Source:EventSource{Component:openshift-cluster-etcd-operator-etcd-endpoints-controller-etcdendpointscontroller,Host:,},FirstTimestamp:2026-03-08 03:27:39.128418295 +0000 UTC m=+546.613887269,LastTimestamp:2026-03-08 03:29:04.140627375 +0000 UTC m=+631.626096349,Count:2,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:openshift-cluster-etcd-operator-etcd-endpoints-controller-etcdendpointscontroller,ReportingInstance:,}" 2026-03-08T03:29:43.982957134Z E0308 03:29:43.982829 1 leaderelection.go:436] error retrieving resource lock openshift-etcd-operator/openshift-cluster-etcd-operator-lock: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-etcd-operator/leases/openshift-cluster-etcd-operator-lock?timeout=4m0s": context deadline exceeded 2026-03-08T03:29:43.982957134Z I0308 03:29:43.982893 1 leaderelection.go:297] failed to renew lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock: timed out waiting for the condition 2026-03-08T03:29:44.024675663Z E0308 03:29:44.024590 1 base_controller.go:279] "Unhandled Error" err="FSyncController reconciliation failed: Post \"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/query\": dial tcp 172.30.89.251:9091: connect: connection refused" 2026-03-08T03:29:44.118288491Z E0308 03:29:44.118147 1 base_controller.go:279] "Unhandled Error" err="etcd-InstallerState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" 2026-03-08T03:29:44.827881750Z E0308 03:29:44.827746 1 base_controller.go:279] "Unhandled Error" err="EtcdCertSignerController reconciliation failed: could not get current etcd-all-bundles configmap the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-all-bundles)" 2026-03-08T03:30:01.024221325Z I0308 03:30:01.024161 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"1e2378d0-368c-46ca-a26c-b6051380ab1c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MissingStaticPod' static pod lifecycle failure - static pod: "etcd" in namespace: "openshift-etcd" for revision: 2 on node: "master-0" didn't show up, waited: 3m30s 2026-03-08T03:30:17.987451279Z E0308 03:30:17.987343 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T03:30:17.987984562Z W0308 03:30:17.987770 1 leaderelection.go:84] leader election lost config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-dn4ll.json0000640000000000000000000001576415153166561024063 0ustar0000000000000000{"metadata":{"name":"etcd-operator-5884b9cd56-dn4ll","generateName":"etcd-operator-5884b9cd56-","namespace":"openshift-etcd-operator","uid":"c6e4afd0-fbcd-49c7-9132-b54c9c28b74b","resourceVersion":"12231","creationTimestamp":"2026-03-08T03:09:33Z","labels":{"app":"etcd-operator","pod-template-hash":"5884b9cd56"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.17/23\"],\"mac_address\":\"0a:58:0a:80:00:11\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.17/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.17\"\n ],\n \"mac\": \"0a:58:0a:80:00:11\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-5884b9cd56","uid":"f8716b47-eeb8-4b5e-968a-f323d975c157","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-89prb","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-89prb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:30:19Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:30:19Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.17","podIPs":[{"ip":"10.128.0.17"}],"startTime":"2026-03-08T03:10:53Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-03-08T03:30:18Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-08T03:18:32Z","finishedAt":"2026-03-08T03:30:18Z","containerID":"cri-o://ba71a05bad6a20ee6c802a92e9435b17cd722af277a98de423aa90bee7e17757"}},"ready":true,"restartCount":5,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","containerID":"cri-o://1af682b4943615c5c2b7ef8840078ec5418d74397ffac005004068932171075c","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-89prb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000002746215153166561034100 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-5bf974f84f-hzx442026-03-08T03:11:36.970121891Z W0308 03:11:36.969870 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-08T03:11:36.970553062Z I0308 03:11:36.970499 1 crypto.go:601] Generating new CA for check-endpoints-signer@1772939496 cert, and key in /tmp/serving-cert-2314769025/serving-signer.crt, /tmp/serving-cert-2314769025/serving-signer.key 2026-03-08T03:11:37.154447423Z I0308 03:11:37.154396 1 observer_polling.go:159] Starting file observer 2026-03-08T03:11:37.168354099Z I0308 03:11:37.168273 1 builder.go:304] check-endpoints version 4.18.0-202602132343.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-08T03:11:37.169122340Z I0308 03:11:37.169097 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-2314769025/tls.crt::/tmp/serving-cert-2314769025/tls.key" 2026-03-08T03:11:37.533538742Z I0308 03:11:37.533471 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-08T03:11:37.534828336Z I0308 03:11:37.534791 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-08T03:11:37.534828336Z I0308 03:11:37.534811 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-08T03:11:37.534841197Z I0308 03:11:37.534834 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-08T03:11:37.534848567Z I0308 03:11:37.534839 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-08T03:11:37.538248276Z I0308 03:11:37.538076 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-08T03:11:37.538248276Z W0308 03:11:37.538100 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T03:11:37.538248276Z W0308 03:11:37.538106 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T03:11:37.538248276Z W0308 03:11:37.538111 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-08T03:11:37.538248276Z W0308 03:11:37.538115 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-08T03:11:37.538248276Z W0308 03:11:37.538119 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-08T03:11:37.538248276Z I0308 03:11:37.538118 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-08T03:11:37.538248276Z W0308 03:11:37.538124 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-08T03:11:37.541212564Z I0308 03:11:37.541179 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-08T03:11:37.541212564Z I0308 03:11:37.541196 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T03:11:37.541231165Z I0308 03:11:37.541212 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-08T03:11:37.541231165Z I0308 03:11:37.541217 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T03:11:37.541421470Z I0308 03:11:37.541247 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T03:11:37.541421470Z I0308 03:11:37.541263 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T03:11:37.541421470Z I0308 03:11:37.541293 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-08T03:11:37.541421470Z I0308 03:11:37.541302 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-08T03:11:37.541876542Z I0308 03:11:37.541782 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2314769025/tls.crt::/tmp/serving-cert-2314769025/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1772939496\" (2026-03-08 03:11:36 +0000 UTC to 2026-04-07 03:11:37 +0000 UTC (now=2026-03-08 03:11:37.541760329 +0000 UTC))" 2026-03-08T03:11:37.541876542Z I0308 03:11:37.541812 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-2314769025/tls.crt::/tmp/serving-cert-2314769025/tls.key" 2026-03-08T03:11:37.541891732Z I0308 03:11:37.541881 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1772939497\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1772939497\" (2026-03-08 02:11:37 +0000 UTC to 2027-03-08 02:11:37 +0000 UTC (now=2026-03-08 03:11:37.541864012 +0000 UTC))" 2026-03-08T03:11:37.541921893Z I0308 03:11:37.541895 1 secure_serving.go:213] Serving securely on [::]:17698 2026-03-08T03:11:37.541938204Z I0308 03:11:37.541931 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-08T03:11:37.541949054Z I0308 03:11:37.541942 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-08T03:11:37.542852428Z I0308 03:11:37.542815 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-03-08T03:11:37.543183336Z I0308 03:11:37.543156 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:11:37.543523625Z I0308 03:11:37.543493 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:11:37.543523625Z I0308 03:11:37.543510 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:11:37.643031195Z I0308 03:11:37.642175 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T03:11:37.643031195Z I0308 03:11:37.642357 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-08T03:11:37.643031195Z I0308 03:11:37.642315 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T03:11:37.643031195Z I0308 03:11:37.642706 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-08 03:01:07 +0000 UTC to 2026-03-09 03:01:07 +0000 UTC (now=2026-03-08 03:11:37.642658325 +0000 UTC))" 2026-03-08T03:11:37.643031195Z I0308 03:11:37.642946 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2314769025/tls.crt::/tmp/serving-cert-2314769025/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1772939496\" (2026-03-08 03:11:36 +0000 UTC to 2026-04-07 03:11:37 +0000 UTC (now=2026-03-08 03:11:37.642930312 +0000 UTC))" 2026-03-08T03:11:37.643206350Z I0308 03:11:37.643102 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1772939497\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1772939497\" (2026-03-08 02:11:37 +0000 UTC to 2027-03-08 02:11:37 +0000 UTC (now=2026-03-08 03:11:37.643089127 +0000 UTC))" 2026-03-08T03:11:37.643316873Z I0308 03:11:37.643278 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-08 02:54:35 +0000 UTC to 2036-03-05 02:54:35 +0000 UTC (now=2026-03-08 03:11:37.643262241 +0000 UTC))" 2026-03-08T03:11:37.643316873Z I0308 03:11:37.643299 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-08 03:01:08 +0000 UTC to 2026-03-09 03:01:08 +0000 UTC (now=2026-03-08 03:11:37.643290742 +0000 UTC))" 2026-03-08T03:11:37.643348353Z I0308 03:11:37.643332 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-08 03:01:08 +0000 UTC to 2027-03-08 03:01:08 +0000 UTC (now=2026-03-08 03:11:37.643320493 +0000 UTC))" 2026-03-08T03:11:37.643357944Z I0308 03:11:37.643350 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-08 03:01:09 +0000 UTC to 2027-03-08 03:01:09 +0000 UTC (now=2026-03-08 03:11:37.643341473 +0000 UTC))" 2026-03-08T03:11:37.643375284Z I0308 03:11:37.643363 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-08 03:01:06 +0000 UTC to 2036-03-05 03:01:06 +0000 UTC (now=2026-03-08 03:11:37.643355124 +0000 UTC))" 2026-03-08T03:11:37.643419365Z I0308 03:11:37.643379 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-08 03:01:07 +0000 UTC to 2026-03-09 03:01:07 +0000 UTC (now=2026-03-08 03:11:37.643371434 +0000 UTC))" 2026-03-08T03:11:37.643571529Z I0308 03:11:37.643538 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2314769025/tls.crt::/tmp/serving-cert-2314769025/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1772939496\" (2026-03-08 03:11:36 +0000 UTC to 2026-04-07 03:11:37 +0000 UTC (now=2026-03-08 03:11:37.643526508 +0000 UTC))" 2026-03-08T03:11:37.643759464Z I0308 03:11:37.643722 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1772939497\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1772939497\" (2026-03-08 02:11:37 +0000 UTC to 2027-03-08 02:11:37 +0000 UTC (now=2026-03-08 03:11:37.643686432 +0000 UTC))" 2026-03-08T03:11:37.813807801Z I0308 03:11:37.813750 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:11:37.844518029Z I0308 03:11:37.843322 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-03-08T03:11:37.844518029Z I0308 03:11:37.843345 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-5bf974f84f-hzx44/openshift-apiserver_current.log0000640000000000000000000011723015153166561031074 0ustar00000000000000002026-03-08T03:30:24.681479605Z E0308 03:30:24.681382 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:24.681479605Z E0308 03:30:24.681459 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:24.681479605Z E0308 03:30:24.681461 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:24.681557987Z E0308 03:30:24.681382 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:24.681597278Z E0308 03:30:24.681564 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:24.922846468Z E0308 03:30:24.922783 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:24.922895799Z E0308 03:30:24.922872 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:24.922959871Z E0308 03:30:24.922921 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:24.923193287Z E0308 03:30:24.923146 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:24.923266669Z E0308 03:30:24.923241 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.308088238Z E0308 03:30:25.307998 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.308367835Z E0308 03:30:25.308333 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.308456937Z E0308 03:30:25.308418 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.311921596Z E0308 03:30:25.308666 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.311921596Z E0308 03:30:25.308702 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.614970420Z E0308 03:30:25.614709 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.618193832Z E0308 03:30:25.618161 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.618866310Z E0308 03:30:25.618224 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.618866310Z E0308 03:30:25.618322 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.618866310Z E0308 03:30:25.618224 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.684989234Z E0308 03:30:25.684934 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.685093686Z E0308 03:30:25.685058 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.685168278Z E0308 03:30:25.685146 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.685366523Z E0308 03:30:25.685313 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.685410344Z E0308 03:30:25.685387 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.685463476Z E0308 03:30:25.685443 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.685539348Z E0308 03:30:25.685501 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.685613410Z E0308 03:30:25.685592 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.685671851Z E0308 03:30:25.685656 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:25.685760583Z E0308 03:30:25.685510 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:26.090816041Z E0308 03:30:26.090764 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:26.091156640Z E0308 03:30:26.091128 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:26.095264375Z E0308 03:30:26.095090 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:26.095264375Z E0308 03:30:26.095148 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:26.095264375Z E0308 03:30:26.095224 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:26.666321065Z E0308 03:30:26.666192 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:26.666600512Z E0308 03:30:26.666551 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:26.666684785Z E0308 03:30:26.666617 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:26.666718095Z E0308 03:30:26.666693 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:26.666989072Z E0308 03:30:26.666551 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.901675876Z E0308 03:30:39.901613 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.902027495Z E0308 03:30:39.902002 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.902217250Z E0308 03:30:39.902196 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.902369424Z E0308 03:30:39.902350 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.902536448Z E0308 03:30:39.902518 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.902684351Z E0308 03:30:39.902664 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.902828825Z E0308 03:30:39.902809 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.903008390Z E0308 03:30:39.902986 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.903243045Z E0308 03:30:39.903214 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.903440000Z E0308 03:30:39.903418 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.903638795Z E0308 03:30:39.903615 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.903833140Z E0308 03:30:39.903808 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.904052066Z E0308 03:30:39.904028 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.904262851Z E0308 03:30:39.904237 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.904447426Z E0308 03:30:39.904423 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.904635500Z E0308 03:30:39.904613 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.904816755Z E0308 03:30:39.904793 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.907453481Z E0308 03:30:39.907425 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.907689577Z E0308 03:30:39.907667 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.907924963Z E0308 03:30:39.907885 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.908168609Z E0308 03:30:39.908145 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.908412775Z E0308 03:30:39.908386 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.908583099Z E0308 03:30:39.908565 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.908644101Z E0308 03:30:39.908619 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.908690982Z E0308 03:30:39.908670 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.909261536Z E0308 03:30:39.908881 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.909376879Z E0308 03:30:39.908626 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.909481832Z E0308 03:30:39.909007 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.909550374Z E0308 03:30:39.909058 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.909659656Z E0308 03:30:39.908576 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.924887168Z E0308 03:30:39.924838 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.925276078Z E0308 03:30:39.925246 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.925516634Z E0308 03:30:39.925486 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.925771130Z E0308 03:30:39.925719 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.926052937Z E0308 03:30:39.926027 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.926191781Z E0308 03:30:39.926176 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.926235532Z E0308 03:30:39.926207 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.926300483Z E0308 03:30:39.926277 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.926351565Z E0308 03:30:39.926329 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.926493718Z E0308 03:30:39.926468 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.926505119Z E0308 03:30:39.926484 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.926542810Z E0308 03:30:39.926531 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.926625352Z E0308 03:30:39.926597 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.926732924Z E0308 03:30:39.926719 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.926805956Z E0308 03:30:39.926781 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:54.509610022Z E0308 03:30:54.509046 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:54.509610022Z E0308 03:30:54.509172 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:54.509610022Z E0308 03:30:54.509241 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:54.509610022Z E0308 03:30:54.509253 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:54.509610022Z E0308 03:30:54.509172 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:54.691007859Z E0308 03:30:54.690962 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:54.694787213Z E0308 03:30:54.694743 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:54.695199274Z E0308 03:30:54.695164 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:54.695465860Z E0308 03:30:54.695437 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:54.695651445Z E0308 03:30:54.695626 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:54.937596510Z E0308 03:30:54.936009 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:54.937596510Z E0308 03:30:54.936046 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:54.937596510Z E0308 03:30:54.936073 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:54.937596510Z E0308 03:30:54.936182 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:54.939798995Z E0308 03:30:54.939729 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000005463615153166561040500 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-799b6db4d7-gstfr2026-03-08T03:30:40.116338427Z I0308 03:30:40.116317 1 base_controller.go:119] Starting #1 worker of openshift-apiserver-EncryptionPrune controller ... 2026-03-08T03:30:40.119154978Z I0308 03:30:40.119100 1 base_controller.go:82] Caches are synced for openshift-apiserver-EncryptionCondition 2026-03-08T03:30:40.119167338Z I0308 03:30:40.119147 1 base_controller.go:82] Caches are synced for openshift-apiserver-EncryptionState 2026-03-08T03:30:40.119198109Z I0308 03:30:40.119169 1 base_controller.go:82] Caches are synced for openshift-apiserver-EncryptionKey 2026-03-08T03:30:40.119198109Z I0308 03:30:40.119189 1 base_controller.go:119] Starting #1 worker of openshift-apiserver-EncryptionKey controller ... 2026-03-08T03:30:40.119228479Z I0308 03:30:40.119170 1 base_controller.go:119] Starting #1 worker of openshift-apiserver-EncryptionState controller ... 2026-03-08T03:30:40.119236860Z I0308 03:30:40.119152 1 base_controller.go:119] Starting #1 worker of openshift-apiserver-EncryptionCondition controller ... 2026-03-08T03:30:40.184867605Z I0308 03:30:40.184804 1 base_controller.go:82] Caches are synced for ConnectivityCheckController 2026-03-08T03:30:40.184867605Z I0308 03:30:40.184840 1 base_controller.go:119] Starting #1 worker of ConnectivityCheckController controller ... 2026-03-08T03:30:40.185197593Z I0308 03:30:40.185168 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-08T03:30:40.685272998Z I0308 03:30:40.685163 1 request.go:700] Waited for 2.167690735s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-apiserver/configmaps/audit 2026-03-08T03:30:40.926510225Z E0308 03:30:40.926404 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:30:40.926510225Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-03-08T03:30:40.926510225Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-03-08T03:30:40.926510225Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-03-08T03:30:40.926510225Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-03-08T03:30:40.926510225Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-03-08T03:30:40.926510225Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-03-08T03:30:40.926510225Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-03-08T03:30:40.926510225Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-03-08T03:30:40.926510225Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-03-08T03:30:40.926510225Z > 2026-03-08T03:30:42.724980737Z E0308 03:30:42.724928 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:30:42.724980737Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-03-08T03:30:42.724980737Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-03-08T03:30:42.724980737Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-03-08T03:30:42.724980737Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-03-08T03:30:42.724980737Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-03-08T03:30:42.724980737Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-03-08T03:30:42.724980737Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-03-08T03:30:42.724980737Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-03-08T03:30:42.724980737Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-03-08T03:30:42.724980737Z > 2026-03-08T03:30:44.524309908Z E0308 03:30:44.524219 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:30:44.524309908Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-03-08T03:30:44.524309908Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-03-08T03:30:44.524309908Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-03-08T03:30:44.524309908Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-03-08T03:30:44.524309908Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-03-08T03:30:44.524309908Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-03-08T03:30:44.524309908Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-03-08T03:30:44.524309908Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-03-08T03:30:44.524309908Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-03-08T03:30:44.524309908Z > 2026-03-08T03:30:46.327453926Z E0308 03:30:46.327362 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:30:46.327453926Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-03-08T03:30:46.327453926Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-03-08T03:30:46.327453926Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-03-08T03:30:46.327453926Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-03-08T03:30:46.327453926Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-03-08T03:30:46.327453926Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-03-08T03:30:46.327453926Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-03-08T03:30:46.327453926Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-03-08T03:30:46.327453926Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-03-08T03:30:46.327453926Z > 2026-03-08T03:30:48.126461320Z E0308 03:30:48.124623 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:30:48.126461320Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-03-08T03:30:48.126461320Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-03-08T03:30:48.126461320Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-03-08T03:30:48.126461320Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-03-08T03:30:48.126461320Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-03-08T03:30:48.126461320Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-03-08T03:30:48.126461320Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-03-08T03:30:48.126461320Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-03-08T03:30:48.126461320Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-03-08T03:30:48.126461320Z > 2026-03-08T03:30:49.928635474Z E0308 03:30:49.927457 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:30:49.928635474Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-03-08T03:30:49.928635474Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-03-08T03:30:49.928635474Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-03-08T03:30:49.928635474Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-03-08T03:30:49.928635474Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-03-08T03:30:49.928635474Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-03-08T03:30:49.928635474Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-03-08T03:30:49.928635474Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-03-08T03:30:49.928635474Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-03-08T03:30:49.928635474Z > 2026-03-08T03:30:51.725033643Z E0308 03:30:51.724964 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:30:51.725033643Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-03-08T03:30:51.725033643Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-03-08T03:30:51.725033643Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-03-08T03:30:51.725033643Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-03-08T03:30:51.725033643Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-03-08T03:30:51.725033643Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-03-08T03:30:51.725033643Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-03-08T03:30:51.725033643Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-03-08T03:30:51.725033643Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-03-08T03:30:51.725033643Z > 2026-03-08T03:30:53.425308533Z I0308 03:30:53.425247 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-08T03:30:53.524751795Z E0308 03:30:53.524696 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:30:53.524751795Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-03-08T03:30:53.524751795Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-03-08T03:30:53.524751795Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-03-08T03:30:53.524751795Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-03-08T03:30:53.524751795Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-03-08T03:30:53.524751795Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-03-08T03:30:53.524751795Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-03-08T03:30:53.524751795Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-03-08T03:30:53.524751795Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-03-08T03:30:53.524751795Z > openshift-apiserver-operator_previous.log0000640000000000000000000005716015153166561040665 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-799b6db4d7-gstfr2026-03-08T03:25:08.446847004Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-03-08T03:25:08.446847004Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-03-08T03:25:08.446847004Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-03-08T03:25:08.446847004Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-03-08T03:25:08.446847004Z > 2026-03-08T03:25:10.593525637Z E0308 03:25:10.593448 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:25:10.593525637Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-03-08T03:25:10.593525637Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-03-08T03:25:10.593525637Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-03-08T03:25:10.593525637Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-03-08T03:25:10.593525637Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-03-08T03:25:10.593525637Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-03-08T03:25:10.593525637Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-03-08T03:25:10.593525637Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-03-08T03:25:10.593525637Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-03-08T03:25:10.593525637Z > 2026-03-08T03:25:12.162987144Z E0308 03:25:12.162847 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:25:12.162987144Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-03-08T03:25:12.162987144Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-03-08T03:25:12.162987144Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-03-08T03:25:12.162987144Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-03-08T03:25:12.162987144Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-03-08T03:25:12.162987144Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-03-08T03:25:12.162987144Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-03-08T03:25:12.162987144Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-03-08T03:25:12.162987144Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-03-08T03:25:12.162987144Z > 2026-03-08T03:25:13.963392249Z E0308 03:25:13.963322 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:25:13.963392249Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-03-08T03:25:13.963392249Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-03-08T03:25:13.963392249Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-03-08T03:25:13.963392249Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-03-08T03:25:13.963392249Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-03-08T03:25:13.963392249Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-03-08T03:25:13.963392249Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-03-08T03:25:13.963392249Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-03-08T03:25:13.963392249Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-03-08T03:25:13.963392249Z > 2026-03-08T03:25:15.762159001Z E0308 03:25:15.762033 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:25:15.762159001Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-03-08T03:25:15.762159001Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-03-08T03:25:15.762159001Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-03-08T03:25:15.762159001Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-03-08T03:25:15.762159001Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-03-08T03:25:15.762159001Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-03-08T03:25:15.762159001Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-03-08T03:25:15.762159001Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-03-08T03:25:15.762159001Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-03-08T03:25:15.762159001Z > 2026-03-08T03:25:23.424089477Z I0308 03:25:23.423106 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-08T03:25:23.444694705Z E0308 03:25:23.444637 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:25:23.444694705Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-03-08T03:25:23.444694705Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-03-08T03:25:23.444694705Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-03-08T03:25:23.444694705Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-03-08T03:25:23.444694705Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-03-08T03:25:23.444694705Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-03-08T03:25:23.444694705Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-03-08T03:25:23.444694705Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-03-08T03:25:23.444694705Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-03-08T03:25:23.444694705Z > 2026-03-08T03:25:25.028504156Z E0308 03:25:25.028396 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:25:25.028504156Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-03-08T03:25:25.028504156Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-03-08T03:25:25.028504156Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-03-08T03:25:25.028504156Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-03-08T03:25:25.028504156Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-03-08T03:25:25.028504156Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-03-08T03:25:25.028504156Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-03-08T03:25:25.028504156Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-03-08T03:25:25.028504156Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-03-08T03:25:25.028504156Z > 2026-03-08T03:25:32.308525483Z I0308 03:25:32.308046 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-08T03:25:33.825261424Z E0308 03:25:33.825194 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:25:33.825261424Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-03-08T03:25:33.825261424Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-03-08T03:25:33.825261424Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-03-08T03:25:33.825261424Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-03-08T03:25:33.825261424Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-03-08T03:25:33.825261424Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-03-08T03:25:33.825261424Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-03-08T03:25:33.825261424Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-03-08T03:25:33.825261424Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-03-08T03:25:33.825261424Z > 2026-03-08T03:26:34.898304691Z E0308 03:26:34.898200 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-08T03:27:02.806027937Z E0308 03:27:02.805961 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-apiserver reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-apiserver)" 2026-03-08T03:27:16.019436740Z E0308 03:27:16.019317 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-AuditPolicy\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-03-08T03:27:34.900500602Z E0308 03:27:34.900389 1 leaderelection.go:436] error retrieving resource lock openshift-apiserver-operator/openshift-apiserver-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io openshift-apiserver-operator-lock) 2026-03-08T03:28:02.808960954Z E0308 03:28:02.808814 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-apiserver reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-apiserver)" 2026-03-08T03:28:50.029591580Z E0308 03:28:50.029543 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-AuditPolicy\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-03-08T03:29:02.812645828Z E0308 03:29:02.812557 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-apiserver reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-apiserver)" 2026-03-08T03:29:08.904894165Z E0308 03:29:08.904814 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-08T03:30:00.894971274Z E0308 03:30:00.894889 1 leaderelection.go:436] error retrieving resource lock openshift-apiserver-operator/openshift-apiserver-operator-lock: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock?timeout=4m0s": context deadline exceeded 2026-03-08T03:30:00.894971274Z I0308 03:30:00.894952 1 leaderelection.go:297] failed to renew lease openshift-apiserver-operator/openshift-apiserver-operator-lock: timed out waiting for the condition 2026-03-08T03:30:02.815614880Z E0308 03:30:02.815513 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-apiserver reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-apiserver)" 2026-03-08T03:30:05.879557255Z W0308 03:30:05.879444 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal 2026-03-08T03:30:05.879557255Z W0308 03:30:05.879481 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal 2026-03-08T03:30:24.038113382Z E0308 03:30:24.038009 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-AuditPolicy\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-03-08T03:30:29.974716583Z I0308 03:30:29.974647 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-08T03:30:32.634674938Z W0308 03:30:32.634188 1 leaderelection.go:84] leader election lost config/pod/openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-gstfr.json0000640000000000000000000001443715153166561030406 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-799b6db4d7-gstfr","generateName":"openshift-apiserver-operator-799b6db4d7-","namespace":"openshift-apiserver-operator","uid":"2a506cf6-bc39-4089-9caa-4c14c4d15c11","resourceVersion":"12298","creationTimestamp":"2026-03-08T03:09:33Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"799b6db4d7"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.12/23\"],\"mac_address\":\"0a:58:0a:80:00:0c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.12/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.12\"\n ],\n \"mac\": \"0a:58:0a:80:00:0c\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-799b6db4d7","uid":"2d13ef84-4d4e-4c72-a0fe-061a69f9c8db","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-7flfl","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-7flfl","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c9"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:30:34Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:30:34Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.12","podIPs":[{"ip":"10.128.0.12"}],"startTime":"2026-03-08T03:10:53Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-03-08T03:30:33Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-08T03:19:00Z","finishedAt":"2026-03-08T03:30:32Z","containerID":"cri-o://62e972b8bed8e15ecb54cf31905c8e961d34ba4506e8988ac047b3329919293e"}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","containerID":"cri-o://e3f49a2d725e5cf30438f10ea0645c747f706caaacfd0d4ff5853f91aa9e7cba","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-7flfl","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000001021515153166561042771 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-5c74bfc494-rz5c82026-03-08T03:30:16.093481427Z I0308 03:30:16.093304 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-08T03:30:16.093481427Z I0308 03:30:16.093439 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-08T03:30:16.094028411Z I0308 03:30:16.093944 1 observer_polling.go:159] Starting file observer 2026-03-08T03:30:36.353091661Z I0308 03:30:36.352965 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202602132343.p2.gc7b5163.assembly.stream.el9-c7b5163-c7b51633b67e3e2860ca053930422f69e17bd40a 2026-03-08T03:30:37.386326196Z I0308 03:30:37.386226 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-08T03:30:37.386326196Z W0308 03:30:37.386279 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T03:30:37.386326196Z W0308 03:30:37.386290 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T03:30:37.386326196Z W0308 03:30:37.386299 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-08T03:30:37.386326196Z W0308 03:30:37.386305 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-08T03:30:37.386326196Z W0308 03:30:37.386311 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-08T03:30:37.386326196Z W0308 03:30:37.386317 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-08T03:30:37.389272750Z I0308 03:30:37.389183 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-08T03:30:37.389621759Z I0308 03:30:37.389557 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... 2026-03-08T03:30:37.390855240Z I0308 03:30:37.390488 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-08T03:30:37.390855240Z I0308 03:30:37.390515 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-08T03:30:37.390855240Z I0308 03:30:37.390525 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T03:30:37.390855240Z I0308 03:30:37.390548 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T03:30:37.390855240Z I0308 03:30:37.390565 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T03:30:37.390855240Z I0308 03:30:37.390599 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T03:30:37.396005219Z I0308 03:30:37.391410 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-08T03:30:37.396005219Z I0308 03:30:37.391451 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-08T03:30:37.396005219Z I0308 03:30:37.391466 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-08T03:30:37.493976925Z I0308 03:30:37.491980 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T03:30:37.495063772Z I0308 03:30:37.495011 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T03:30:37.498952549Z I0308 03:30:37.495185 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController kube-scheduler-operator-container_previous.log0000640000000000000000000004607015153166561043173 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-5c74bfc494-rz5c82026-03-08T03:24:40.898237377Z I0308 03:24:40.897587 1 base_controller.go:76] Waiting for caches to sync for PruneController 2026-03-08T03:24:40.898237377Z I0308 03:24:40.897762 1 base_controller.go:76] Waiting for caches to sync for RevisionController 2026-03-08T03:24:40.899396287Z I0308 03:24:40.899016 1 base_controller.go:76] Waiting for caches to sync for KubeControllerManagerStaticResources-StaticResources 2026-03-08T03:24:40.995198598Z I0308 03:24:40.995118 1 base_controller.go:82] Caches are synced for kube-controller-manager-RemoveStaleConditions 2026-03-08T03:24:40.995198598Z I0308 03:24:40.995168 1 base_controller.go:119] Starting #1 worker of kube-controller-manager-RemoveStaleConditions controller ... 2026-03-08T03:24:40.997505868Z I0308 03:24:40.997464 1 base_controller.go:82] Caches are synced for cluster-kube-scheduler-operator-UnsupportedConfigOverrides 2026-03-08T03:24:40.997525628Z I0308 03:24:40.997477 1 base_controller.go:82] Caches are synced for StatusSyncer_kube-scheduler 2026-03-08T03:24:40.997525628Z I0308 03:24:40.997515 1 base_controller.go:119] Starting #1 worker of StatusSyncer_kube-scheduler controller ... 2026-03-08T03:24:40.997535579Z I0308 03:24:40.997486 1 base_controller.go:119] Starting #1 worker of cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller ... 2026-03-08T03:24:40.997701773Z I0308 03:24:40.997655 1 base_controller.go:82] Caches are synced for LoggingSyncer 2026-03-08T03:24:40.997701773Z I0308 03:24:40.997683 1 base_controller.go:119] Starting #1 worker of LoggingSyncer controller ... 2026-03-08T03:24:41.097427376Z I0308 03:24:41.097361 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:24:41.098162275Z I0308 03:24:41.097555 1 base_controller.go:82] Caches are synced for BackingResourceController-StaticResources 2026-03-08T03:24:41.098162275Z I0308 03:24:41.097590 1 base_controller.go:119] Starting #1 worker of BackingResourceController-StaticResources controller ... 2026-03-08T03:24:41.299333085Z I0308 03:24:41.299280 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:24:41.397623891Z I0308 03:24:41.397530 1 base_controller.go:82] Caches are synced for kube-scheduler-InstallerState 2026-03-08T03:24:41.397623891Z I0308 03:24:41.397562 1 base_controller.go:119] Starting #1 worker of kube-scheduler-InstallerState controller ... 2026-03-08T03:24:41.397623891Z I0308 03:24:41.397579 1 base_controller.go:82] Caches are synced for kube-scheduler-StaticPodState 2026-03-08T03:24:41.397623891Z I0308 03:24:41.397612 1 base_controller.go:119] Starting #1 worker of kube-scheduler-StaticPodState controller ... 2026-03-08T03:24:41.497680253Z I0308 03:24:41.497612 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:24:41.498696619Z I0308 03:24:41.498394 1 base_controller.go:82] Caches are synced for RevisionController 2026-03-08T03:24:41.498696619Z I0308 03:24:41.498407 1 base_controller.go:119] Starting #1 worker of RevisionController controller ... 2026-03-08T03:24:41.594965362Z I0308 03:24:41.594892 1 base_controller.go:82] Caches are synced for kube-scheduler 2026-03-08T03:24:41.594965362Z I0308 03:24:41.594936 1 base_controller.go:119] Starting #1 worker of kube-scheduler controller ... 2026-03-08T03:24:41.594992513Z I0308 03:24:41.594961 1 base_controller.go:82] Caches are synced for TargetConfigController 2026-03-08T03:24:41.595003483Z I0308 03:24:41.594989 1 base_controller.go:119] Starting #1 worker of TargetConfigController controller ... 2026-03-08T03:24:41.595041594Z I0308 03:24:41.595014 1 base_controller.go:82] Caches are synced for ConfigObserver 2026-03-08T03:24:41.595083015Z I0308 03:24:41.595047 1 base_controller.go:119] Starting #1 worker of ConfigObserver controller ... 2026-03-08T03:24:41.597179770Z I0308 03:24:41.597125 1 base_controller.go:82] Caches are synced for MissingStaticPodController 2026-03-08T03:24:41.597179770Z I0308 03:24:41.597142 1 base_controller.go:119] Starting #1 worker of MissingStaticPodController controller ... 2026-03-08T03:24:41.597626192Z I0308 03:24:41.597602 1 base_controller.go:82] Caches are synced for Installer 2026-03-08T03:24:41.597626192Z I0308 03:24:41.597615 1 base_controller.go:119] Starting #1 worker of Installer controller ... 2026-03-08T03:24:41.597653222Z I0308 03:24:41.597636 1 base_controller.go:82] Caches are synced for PruneController 2026-03-08T03:24:41.597664093Z I0308 03:24:41.597650 1 base_controller.go:119] Starting #1 worker of PruneController controller ... 2026-03-08T03:24:41.597828087Z I0308 03:24:41.597794 1 prune_controller.go:277] Nothing to prune 2026-03-08T03:24:41.695785514Z I0308 03:24:41.695729 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:24:41.699782398Z I0308 03:24:41.699688 1 base_controller.go:82] Caches are synced for KubeControllerManagerStaticResources-StaticResources 2026-03-08T03:24:41.699782398Z I0308 03:24:41.699705 1 base_controller.go:119] Starting #1 worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-08T03:24:41.897533050Z I0308 03:24:41.897454 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:24:41.897573391Z I0308 03:24:41.897545 1 base_controller.go:82] Caches are synced for GuardController 2026-03-08T03:24:41.897573391Z I0308 03:24:41.897559 1 base_controller.go:119] Starting #1 worker of GuardController controller ... 2026-03-08T03:24:41.998143136Z I0308 03:24:41.998063 1 base_controller.go:82] Caches are synced for kube-scheduler-Node 2026-03-08T03:24:41.998143136Z I0308 03:24:41.998102 1 base_controller.go:119] Starting #1 worker of kube-scheduler-Node controller ... 2026-03-08T03:24:42.494405450Z I0308 03:24:42.494347 1 request.go:700] Waited for 1.096354918s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/openshift-kube-scheduler-master-0 2026-03-08T03:24:43.507220567Z I0308 03:24:43.507148 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"0ee44055-31e1-4062-beed-d9fbfaa91299", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing 2026-03-08T03:24:44.380182204Z I0308 03:24:44.380059 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Pending phase 2026-03-08T03:24:46.432234947Z I0308 03:24:46.431806 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-03-08T03:24:47.501143449Z I0308 03:24:47.501042 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-03-08T03:25:16.574722092Z I0308 03:25:16.574608 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"0ee44055-31e1-4062-beed-d9fbfaa91299", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/kube-scheduler version "kube-scheduler" changed from "" to "1.31.14" 2026-03-08T03:25:16.574722092Z I0308 03:25:16.574653 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"0ee44055-31e1-4062-beed-d9fbfaa91299", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/kube-scheduler version "operator" changed from "" to "4.18.34" 2026-03-08T03:25:16.575091081Z I0308 03:25:16.575053 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"versions":[{"name":"raw-internal","version":"4.18.34"},{"name":"kube-scheduler","version":"1.31.14"},{"name":"operator","version":"4.18.34"}]}} 2026-03-08T03:25:16.582447303Z I0308 03:25:16.582231 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-03-08T03:25:16.589814526Z I0308 03:25:16.589730 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"0ee44055-31e1-4062-beed-d9fbfaa91299", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: status.versions changed from [{"raw-internal" "4.18.34"}] to [{"raw-internal" "4.18.34"} {"kube-scheduler" "1.31.14"} {"operator" "4.18.34"}] 2026-03-08T03:25:16.643300792Z I0308 03:25:16.643236 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-03-08T03:25:17.304762067Z I0308 03:25:17.304691 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-03-08T03:25:17.772976258Z I0308 03:25:17.772868 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-03-08T03:25:18.571927843Z I0308 03:25:18.571860 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-03-08T03:25:19.972424560Z I0308 03:25:19.972318 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because static pod is pending 2026-03-08T03:25:20.572224867Z I0308 03:25:20.572157 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because static pod is pending 2026-03-08T03:26:14.892257453Z E0308 03:26:14.892145 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-08T03:26:41.400605473Z E0308 03:26:41.400474 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-InstallerState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" 2026-03-08T03:27:14.894227730Z E0308 03:27:14.894138 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io openshift-cluster-kube-scheduler-operator-lock) 2026-03-08T03:27:15.405534481Z E0308 03:27:15.405463 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-StaticPodState\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-03-08T03:27:41.404049626Z E0308 03:27:41.403881 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-InstallerState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" 2026-03-08T03:28:15.109204731Z E0308 03:28:15.109077 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa), \"manifests/installer-cluster-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:openshift-kube-scheduler-installer), unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": Timeout: request did not complete within requested timeout - context deadline exceeded]" 2026-03-08T03:28:41.407469397Z E0308 03:28:41.407393 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-InstallerState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" 2026-03-08T03:28:48.900056410Z E0308 03:28:48.899899 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-08T03:28:49.412776088Z E0308 03:28:49.412652 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-StaticPodState\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-03-08T03:29:40.888300871Z E0308 03:29:40.888131 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock?timeout=4m0s": context deadline exceeded 2026-03-08T03:29:40.888300871Z I0308 03:29:40.888206 1 leaderelection.go:297] failed to renew lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock: timed out waiting for the condition 2026-03-08T03:29:41.411181527Z E0308 03:29:41.411050 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-InstallerState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" 2026-03-08T03:29:49.445745105Z I0308 03:29:49.445649 1 prune_controller.go:277] Nothing to prune 2026-03-08T03:29:49.446391992Z I0308 03:29:49.446321 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-08T03:11:06Z","message":"NodeControllerDegraded: All master nodes are ready\nStaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-kube-scheduler-master-0)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-08T03:11:22Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-08T03:11:07Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-08T03:11:06Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-08T03:11:06Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-08T03:30:00.927860526Z I0308 03:30:00.927784 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because static pod is pending 2026-03-08T03:30:00.939293619Z I0308 03:30:00.939237 1 prune_controller.go:277] Nothing to prune 2026-03-08T03:30:00.967513312Z I0308 03:30:00.967456 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because static pod is pending 2026-03-08T03:30:01.119341612Z W0308 03:30:01.119249 1 dynamic_operator_client.go:352] .status.conditions["StaticPodsDegraded"].reason is missing; this will eventually be fatal 2026-03-08T03:30:01.119341612Z W0308 03:30:01.119290 1 dynamic_operator_client.go:355] .status.conditions["StaticPodsDegraded"].message is missing; this will eventually be fatal 2026-03-08T03:30:01.152943093Z I0308 03:30:01.150984 1 prune_controller.go:277] Nothing to prune 2026-03-08T03:30:01.915298364Z I0308 03:30:01.915156 1 installer_controller.go:540] "master-0" moving to (v1.NodeStatus) { 2026-03-08T03:30:01.915298364Z NodeName: (string) (len=8) "master-0", 2026-03-08T03:30:01.915298364Z CurrentRevision: (int32) 4, 2026-03-08T03:30:01.915298364Z TargetRevision: (int32) 0, 2026-03-08T03:30:01.915298364Z LastFailedRevision: (int32) 0, 2026-03-08T03:30:01.915298364Z LastFailedTime: (*v1.Time)(), 2026-03-08T03:30:01.915298364Z LastFailedReason: (string) "", 2026-03-08T03:30:01.915298364Z LastFailedCount: (int) 0, 2026-03-08T03:30:01.915298364Z LastFallbackCount: (int) 0, 2026-03-08T03:30:01.915298364Z LastFailedRevisionErrors: ([]string) 2026-03-08T03:30:01.915298364Z } 2026-03-08T03:30:01.915298364Z because static pod is ready 2026-03-08T03:30:01.918849085Z W0308 03:30:01.918745 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-03-08T03:30:01.918849085Z W0308 03:30:01.918792 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-03-08T03:30:01.918849085Z W0308 03:30:01.918806 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-08T03:30:01.918849085Z W0308 03:30:01.918819 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-08T03:30:01.918849085Z W0308 03:30:01.918830 1 dynamic_operator_client.go:352] .status.conditions["StaticPodsAvailable"].reason is missing; this will eventually be fatal 2026-03-08T03:30:01.945631171Z I0308 03:30:01.945510 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"0ee44055-31e1-4062-beed-d9fbfaa91299", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NodeCurrentRevisionChanged' Updated node "master-0" from revision 0 to 4 because static pod is ready 2026-03-08T03:30:01.951337067Z I0308 03:30:01.951280 1 prune_controller.go:277] Nothing to prune 2026-03-08T03:30:14.892722094Z E0308 03:30:14.892619 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T03:30:14.892820077Z W0308 03:30:14.892718 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-rz5c8.json0000640000000000000000000001366015153166561032026 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-5c74bfc494-rz5c8","generateName":"openshift-kube-scheduler-operator-5c74bfc494-","namespace":"openshift-kube-scheduler-operator","uid":"89e15db4-c541-4d53-878d-706fa022f970","resourceVersion":"12224","creationTimestamp":"2026-03-08T03:09:33Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"5c74bfc494"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.15/23\"],\"mac_address\":\"0a:58:0a:80:00:0f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.15/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.15\"\n ],\n \"mac\": \"0a:58:0a:80:00:0f\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-5c74bfc494","uid":"ecb306f4-1a78-4bef-902b-e5ad089b07d6","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:30:16Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:30:16Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.15","podIPs":[{"ip":"10.128.0.15"}],"startTime":"2026-03-08T03:10:53Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-03-08T03:30:15Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-08T03:19:03Z","finishedAt":"2026-03-08T03:30:14Z","containerID":"cri-o://00d9ac3c9b6193b454aa568c1a383fab452df49e6573435f6a143be4c2708486"}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","containerID":"cri-o://950f94c6911e149b7be2dd3d4f7aa50d7480e512077474a7b613f475690032ec","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-recovery-controller_current.log0000640000000000000000000007246015153166561036606 0ustar0000000000000000config/pod/openshift-kube-scheduler/logs/openshift-kube-scheduler-master-02026-03-08T03:25:19.195001067Z + timeout 3m /bin/bash -exuo pipefail -c 'while [ -n "$(ss -Htanop \( sport = 11443 \))" ]; do sleep 1; done' 2026-03-08T03:25:19.199518805Z ++ ss -Htanop '(' sport = 11443 ')' 2026-03-08T03:25:19.218480030Z + '[' -n '' ']' 2026-03-08T03:25:19.219254910Z + exec cluster-kube-scheduler-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig --namespace=openshift-kube-scheduler --listen=0.0.0.0:11443 -v=2 2026-03-08T03:25:19.286423914Z W0308 03:25:19.286162 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-08T03:25:19.286793513Z I0308 03:25:19.286724 1 crypto.go:601] Generating new CA for cert-recovery-controller-signer@1772940319 cert, and key in /tmp/serving-cert-2254749665/serving-signer.crt, /tmp/serving-cert-2254749665/serving-signer.key 2026-03-08T03:25:19.720199406Z I0308 03:25:19.720127 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-08T03:25:19.720811952Z I0308 03:25:19.720764 1 observer_polling.go:159] Starting file observer 2026-03-08T03:25:19.721132561Z I0308 03:25:19.721093 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-08T03:25:19.721132561Z I0308 03:25:19.721111 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-08T03:25:19.726434929Z W0308 03:25:19.726382 1 builder.go:272] unable to get owner reference (falling back to namespace): Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/pods": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:25:19.726527052Z I0308 03:25:19.726495 1 builder.go:304] cert-recovery-controller version v0.0.0-master+$Format:%H$-$Format:%H$ 2026-03-08T03:25:19.731442070Z W0308 03:25:19.731395 1 builder.go:364] unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:25:19.731617334Z I0308 03:25:19.731579 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler/cert-recovery-controller-lock... 2026-03-08T03:25:19.732490457Z I0308 03:25:19.732427 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-scheduler", Name:"openshift-kube-scheduler", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ControlPlaneTopology' unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:25:19.734949391Z E0308 03:25:19.734887 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189abfd3cd8e7af4 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,LastTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-08T03:25:19.739073199Z E0308 03:25:19.739017 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:25:22.836064688Z E0308 03:25:22.835874 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189abfd3cd8e7af4 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,LastTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-08T03:25:32.843106777Z E0308 03:25:32.842995 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189abfd3cd8e7af4 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,LastTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-08T03:25:42.850358501Z E0308 03:25:42.850249 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189abfd3cd8e7af4 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,LastTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-08T03:25:52.858097067Z E0308 03:25:52.857983 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189abfd3cd8e7af4 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,LastTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-08T03:26:02.867747745Z E0308 03:26:02.867649 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189abfd3cd8e7af4 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,LastTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-08T03:26:09.474420425Z E0308 03:26:09.474305 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:26:12.877757401Z E0308 03:26:12.877659 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189abfd3cd8e7af4 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,LastTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-08T03:26:22.884491393Z E0308 03:26:22.884417 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189abfd3cd8e7af4 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,LastTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-08T03:26:32.893259991Z E0308 03:26:32.893181 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189abfd3cd8e7af4 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,LastTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-08T03:26:38.967668917Z E0308 03:26:38.967579 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:26:42.902088519Z E0308 03:26:42.902016 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189abfd3cd8e7af4 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,LastTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-08T03:26:52.909353828Z E0308 03:26:52.909270 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189abfd3cd8e7af4 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,LastTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-08T03:27:02.918373732Z E0308 03:27:02.918261 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189abfd3cd8e7af4 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,LastTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-08T03:27:02.918373732Z E0308 03:27:02.918352 1 event.go:307] "Unable to write event (retry limit exceeded!)" event="&Event{ObjectMeta:{openshift-kube-scheduler.189abfd3cd8e7af4 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,LastTimestamp:2026-03-08 03:25:19.731383028 +0000 UTC m=+0.507733634,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-08T03:27:32.322473275Z E0308 03:27:32.322344 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:28:27.543409817Z E0308 03:28:27.543304 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:28:55.782874124Z E0308 03:28:55.782718 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:29:33.589491501Z E0308 03:29:33.589383 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:30:08.404927622Z E0308 03:30:08.404810 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:30:43.098299783Z E0308 03:30:43.098203 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery kube-scheduler-cert-syncer_current.log0000640000000000000000000007041215153166561035020 0ustar0000000000000000config/pod/openshift-kube-scheduler/logs/openshift-kube-scheduler-master-02026-03-08T03:25:19.027586837Z I0308 03:25:19.015888 1 observer_polling.go:159] Starting file observer 2026-03-08T03:25:19.027586837Z I0308 03:25:19.015895 1 base_controller.go:76] Waiting for caches to sync for CertSyncController 2026-03-08T03:25:19.027586837Z W0308 03:25:19.020310 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:25:19.027586837Z E0308 03:25:19.020546 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:25:19.027586837Z W0308 03:25:19.022329 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:25:19.027586837Z E0308 03:25:19.022368 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:25:19.863977589Z W0308 03:25:19.863879 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:25:19.864016410Z E0308 03:25:19.863970 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:25:20.152690436Z W0308 03:25:20.152578 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:25:20.152690436Z E0308 03:25:20.152669 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:25:21.773610195Z W0308 03:25:21.773537 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:25:21.773670046Z E0308 03:25:21.773625 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:25:22.898198170Z W0308 03:25:22.898097 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:25:22.898266792Z E0308 03:25:22.898188 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:25:25.308632848Z W0308 03:25:25.308548 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:25:25.308686009Z E0308 03:25:25.308654 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:25:26.802000159Z W0308 03:25:26.801883 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:25:26.802166973Z E0308 03:25:26.802138 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:25:32.194046914Z W0308 03:25:32.193941 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:25:32.194107016Z E0308 03:25:32.194044 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:25:34.924249519Z W0308 03:25:34.922835 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:25:34.924249519Z E0308 03:25:34.922997 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:25:50.571315707Z W0308 03:25:50.571194 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:25:50.571315707Z E0308 03:25:50.571283 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:25:54.188429222Z W0308 03:25:54.188247 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:25:54.188429222Z E0308 03:25:54.188374 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:26:28.306752191Z W0308 03:26:28.306673 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:26:28.306829292Z E0308 03:26:28.306750 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:26:39.800617778Z W0308 03:26:39.800528 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:26:39.800617778Z E0308 03:26:39.800601 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:27:09.423621666Z W0308 03:27:09.423464 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:27:09.423702637Z E0308 03:27:09.423618 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:27:27.447685898Z W0308 03:27:27.447533 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:27:27.447685898Z E0308 03:27:27.447636 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:27:47.109240888Z W0308 03:27:47.109153 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:27:47.109425622Z E0308 03:27:47.109398 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:27:58.664802419Z W0308 03:27:58.664668 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:27:58.664802419Z E0308 03:27:58.664786 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:28:20.819737516Z W0308 03:28:20.819637 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:28:20.819737516Z E0308 03:28:20.819724 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:28:54.323624340Z W0308 03:28:54.323519 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:28:54.323624340Z E0308 03:28:54.323596 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:29:05.123895242Z W0308 03:29:05.123749 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:29:05.123895242Z E0308 03:29:05.123860 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:29:31.971108678Z W0308 03:29:31.970997 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:29:31.971289803Z E0308 03:29:31.971261 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:29:53.671634918Z W0308 03:29:53.671556 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:29:53.671791662Z E0308 03:29:53.671767 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:30:04.387453198Z W0308 03:30:04.387372 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:30:04.387619972Z E0308 03:30:04.387593 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-08T03:30:52.131069971Z W0308 03:30:52.130986 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-08T03:30:52.131112132Z E0308 03:30:52.131063 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" kube-scheduler_current.log0000640000000000000000000002734615153166561032574 0ustar0000000000000000config/pod/openshift-kube-scheduler/logs/openshift-kube-scheduler-master-02026-03-08T03:29:07.480707869Z name: NodeResourcesFit 2026-03-08T03:29:07.480707869Z - args: 2026-03-08T03:29:07.480707869Z apiVersion: kubescheduler.config.k8s.io/v1 2026-03-08T03:29:07.480707869Z defaultingType: System 2026-03-08T03:29:07.480707869Z kind: PodTopologySpreadArgs 2026-03-08T03:29:07.480707869Z name: PodTopologySpread 2026-03-08T03:29:07.480707869Z - args: 2026-03-08T03:29:07.480707869Z apiVersion: kubescheduler.config.k8s.io/v1 2026-03-08T03:29:07.480707869Z bindTimeoutSeconds: 600 2026-03-08T03:29:07.480707869Z kind: VolumeBindingArgs 2026-03-08T03:29:07.480707869Z name: VolumeBinding 2026-03-08T03:29:07.480707869Z plugins: 2026-03-08T03:29:07.480707869Z bind: {} 2026-03-08T03:29:07.480707869Z filter: {} 2026-03-08T03:29:07.480707869Z multiPoint: 2026-03-08T03:29:07.480707869Z enabled: 2026-03-08T03:29:07.480707869Z - name: SchedulingGates 2026-03-08T03:29:07.480707869Z weight: 0 2026-03-08T03:29:07.480707869Z - name: PrioritySort 2026-03-08T03:29:07.480707869Z weight: 0 2026-03-08T03:29:07.480707869Z - name: NodeUnschedulable 2026-03-08T03:29:07.480707869Z weight: 0 2026-03-08T03:29:07.480707869Z - name: NodeName 2026-03-08T03:29:07.480707869Z weight: 0 2026-03-08T03:29:07.480707869Z - name: TaintToleration 2026-03-08T03:29:07.480707869Z weight: 3 2026-03-08T03:29:07.480707869Z - name: NodeAffinity 2026-03-08T03:29:07.480707869Z weight: 2 2026-03-08T03:29:07.480707869Z - name: NodePorts 2026-03-08T03:29:07.480707869Z weight: 0 2026-03-08T03:29:07.480707869Z - name: NodeResourcesFit 2026-03-08T03:29:07.480707869Z weight: 1 2026-03-08T03:29:07.480707869Z - name: VolumeRestrictions 2026-03-08T03:29:07.480707869Z weight: 0 2026-03-08T03:29:07.480707869Z - name: NodeVolumeLimits 2026-03-08T03:29:07.480707869Z weight: 0 2026-03-08T03:29:07.480707869Z - name: VolumeBinding 2026-03-08T03:29:07.480707869Z weight: 0 2026-03-08T03:29:07.480707869Z - name: VolumeZone 2026-03-08T03:29:07.480707869Z weight: 0 2026-03-08T03:29:07.480707869Z - name: PodTopologySpread 2026-03-08T03:29:07.480707869Z weight: 2 2026-03-08T03:29:07.480707869Z - name: InterPodAffinity 2026-03-08T03:29:07.480707869Z weight: 2 2026-03-08T03:29:07.480707869Z - name: DefaultPreemption 2026-03-08T03:29:07.480707869Z weight: 0 2026-03-08T03:29:07.480707869Z - name: NodeResourcesBalancedAllocation 2026-03-08T03:29:07.480707869Z weight: 1 2026-03-08T03:29:07.480707869Z - name: ImageLocality 2026-03-08T03:29:07.480707869Z weight: 1 2026-03-08T03:29:07.480707869Z - name: DefaultBinder 2026-03-08T03:29:07.480707869Z weight: 0 2026-03-08T03:29:07.480707869Z permit: {} 2026-03-08T03:29:07.480707869Z postBind: {} 2026-03-08T03:29:07.480707869Z postFilter: {} 2026-03-08T03:29:07.480707869Z preBind: {} 2026-03-08T03:29:07.480707869Z preEnqueue: {} 2026-03-08T03:29:07.480707869Z preFilter: {} 2026-03-08T03:29:07.480707869Z preScore: {} 2026-03-08T03:29:07.480707869Z queueSort: {} 2026-03-08T03:29:07.480707869Z reserve: {} 2026-03-08T03:29:07.480707869Z score: {} 2026-03-08T03:29:07.480707869Z schedulerName: default-scheduler 2026-03-08T03:29:07.480707869Z > 2026-03-08T03:29:07.483515241Z I0308 03:29:07.483431 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-03-08T03:29:07.483515241Z I0308 03:29:07.483461 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-03-08T03:29:07.486848826Z I0308 03:29:07.486762 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T03:29:07.486848826Z I0308 03:29:07.486837 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T03:29:07.489271358Z I0308 03:29:07.489170 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key" 2026-03-08T03:29:07.489429262Z I0308 03:29:07.489354 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key" certDetail="\"scheduler.openshift-kube-scheduler.svc\" [serving] validServingFor=[scheduler.openshift-kube-scheduler.svc,scheduler.openshift-kube-scheduler.svc.cluster.local] issuer=\"openshift-service-serving-signer@1772939468\" (2026-03-08 03:11:24 +0000 UTC to 2028-03-07 03:11:25 +0000 UTC (now=2026-03-08 03:29:07.489280779 +0000 UTC))" 2026-03-08T03:29:07.489754111Z I0308 03:29:07.489682 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1772940487\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1772940487\" (2026-03-08 02:28:07 +0000 UTC to 2029-03-08 02:28:07 +0000 UTC (now=2026-03-08 03:29:07.489653418 +0000 UTC))" 2026-03-08T03:29:07.489779351Z I0308 03:29:07.489759 1 secure_serving.go:213] Serving securely on [::]:10259 2026-03-08T03:29:07.490519520Z I0308 03:29:07.490462 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-08T03:29:07.498614937Z I0308 03:29:07.498440 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-08T03:29:07.499860839Z I0308 03:29:07.499794 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:29:07.500357792Z I0308 03:29:07.500310 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:29:07.500576768Z I0308 03:29:07.500533 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:29:07.501167523Z I0308 03:29:07.501104 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:29:07.501313756Z I0308 03:29:07.501277 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:29:07.501518852Z I0308 03:29:07.501477 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:29:07.501999414Z I0308 03:29:07.501949 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:29:07.502211949Z I0308 03:29:07.502157 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:29:07.502415435Z I0308 03:29:07.502349 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:29:07.502473906Z I0308 03:29:07.502416 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:29:07.508405718Z I0308 03:29:07.508076 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:29:07.508587993Z I0308 03:29:07.508501 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:29:07.508607393Z I0308 03:29:07.508571 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-08T03:29:07.515141150Z I0308 03:29:07.515068 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:29:07.533585922Z I0308 03:29:07.533486 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:29:07.541266409Z I0308 03:29:07.541175 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:29:07.587958353Z I0308 03:29:07.587821 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T03:29:07.588508827Z I0308 03:29:07.588418 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-08 02:54:35 +0000 UTC to 2036-03-05 02:54:35 +0000 UTC (now=2026-03-08 03:29:07.588384044 +0000 UTC))" 2026-03-08T03:29:07.588508827Z I0308 03:29:07.588478 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-08 03:01:08 +0000 UTC to 2026-03-09 03:01:08 +0000 UTC (now=2026-03-08 03:29:07.588466256 +0000 UTC))" 2026-03-08T03:29:07.588534948Z I0308 03:29:07.588506 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-08 03:01:08 +0000 UTC to 2027-03-08 03:01:08 +0000 UTC (now=2026-03-08 03:29:07.588497137 +0000 UTC))" 2026-03-08T03:29:07.588573719Z I0308 03:29:07.588530 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-08 03:01:09 +0000 UTC to 2027-03-08 03:01:09 +0000 UTC (now=2026-03-08 03:29:07.588520958 +0000 UTC))" 2026-03-08T03:29:07.588640841Z I0308 03:29:07.588584 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-08 03:01:06 +0000 UTC to 2036-03-05 03:01:06 +0000 UTC (now=2026-03-08 03:29:07.588543398 +0000 UTC))" 2026-03-08T03:29:07.588949449Z I0308 03:29:07.588881 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key" certDetail="\"scheduler.openshift-kube-scheduler.svc\" [serving] validServingFor=[scheduler.openshift-kube-scheduler.svc,scheduler.openshift-kube-scheduler.svc.cluster.local] issuer=\"openshift-service-serving-signer@1772939468\" (2026-03-08 03:11:24 +0000 UTC to 2028-03-07 03:11:25 +0000 UTC (now=2026-03-08 03:29:07.588862086 +0000 UTC))" 2026-03-08T03:29:07.589219045Z I0308 03:29:07.589158 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1772940487\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1772940487\" (2026-03-08 02:28:07 +0000 UTC to 2029-03-08 02:28:07 +0000 UTC (now=2026-03-08 03:29:07.589141293 +0000 UTC))" 2026-03-08T03:29:07.591480713Z I0308 03:29:07.591378 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler/kube-scheduler... 2026-03-08T03:30:01.093887640Z E0308 03:30:01.091941 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler/kube-scheduler: Get "https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler/leases/kube-scheduler?timeout=53.5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) wait-for-host-port_current.log0000640000000000000000000000010615153166561033340 0ustar0000000000000000config/pod/openshift-kube-scheduler/logs/openshift-kube-scheduler-master-02026-03-08T03:25:17.233141497Z Waiting for port :10259 to be released.kube-scheduler_previous.log0000640000000000000000000003635115153166561032762 0ustar0000000000000000config/pod/openshift-kube-scheduler/logs/openshift-kube-scheduler-master-02026-03-08T03:25:19.164440110Z weight: 0 2026-03-08T03:25:19.164440110Z - name: PrioritySort 2026-03-08T03:25:19.164440110Z weight: 0 2026-03-08T03:25:19.164440110Z - name: NodeUnschedulable 2026-03-08T03:25:19.164440110Z weight: 0 2026-03-08T03:25:19.164440110Z - name: NodeName 2026-03-08T03:25:19.164440110Z weight: 0 2026-03-08T03:25:19.164440110Z - name: TaintToleration 2026-03-08T03:25:19.164440110Z weight: 3 2026-03-08T03:25:19.164440110Z - name: NodeAffinity 2026-03-08T03:25:19.164440110Z weight: 2 2026-03-08T03:25:19.164440110Z - name: NodePorts 2026-03-08T03:25:19.164440110Z weight: 0 2026-03-08T03:25:19.164440110Z - name: NodeResourcesFit 2026-03-08T03:25:19.164440110Z weight: 1 2026-03-08T03:25:19.164440110Z - name: VolumeRestrictions 2026-03-08T03:25:19.164440110Z weight: 0 2026-03-08T03:25:19.164440110Z - name: NodeVolumeLimits 2026-03-08T03:25:19.164440110Z weight: 0 2026-03-08T03:25:19.164440110Z - name: VolumeBinding 2026-03-08T03:25:19.164440110Z weight: 0 2026-03-08T03:25:19.164440110Z - name: VolumeZone 2026-03-08T03:25:19.164440110Z weight: 0 2026-03-08T03:25:19.164440110Z - name: PodTopologySpread 2026-03-08T03:25:19.164440110Z weight: 2 2026-03-08T03:25:19.164440110Z - name: InterPodAffinity 2026-03-08T03:25:19.164440110Z weight: 2 2026-03-08T03:25:19.164440110Z - name: DefaultPreemption 2026-03-08T03:25:19.164440110Z weight: 0 2026-03-08T03:25:19.164440110Z - name: NodeResourcesBalancedAllocation 2026-03-08T03:25:19.164440110Z weight: 1 2026-03-08T03:25:19.164440110Z - name: ImageLocality 2026-03-08T03:25:19.164440110Z weight: 1 2026-03-08T03:25:19.164440110Z - name: DefaultBinder 2026-03-08T03:25:19.164440110Z weight: 0 2026-03-08T03:25:19.164440110Z permit: {} 2026-03-08T03:25:19.164440110Z postBind: {} 2026-03-08T03:25:19.164440110Z postFilter: {} 2026-03-08T03:25:19.164440110Z preBind: {} 2026-03-08T03:25:19.164440110Z preEnqueue: {} 2026-03-08T03:25:19.164440110Z preFilter: {} 2026-03-08T03:25:19.164440110Z preScore: {} 2026-03-08T03:25:19.164440110Z queueSort: {} 2026-03-08T03:25:19.164440110Z reserve: {} 2026-03-08T03:25:19.164440110Z score: {} 2026-03-08T03:25:19.164440110Z schedulerName: default-scheduler 2026-03-08T03:25:19.164440110Z > 2026-03-08T03:25:19.166317719Z I0308 03:25:19.166217 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-03-08T03:25:19.166317719Z I0308 03:25:19.166236 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-03-08T03:25:19.171691309Z I0308 03:25:19.171646 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-08T03:25:19.171710299Z I0308 03:25:19.171682 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T03:25:19.171756471Z I0308 03:25:19.171735 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-08T03:25:19.171756471Z I0308 03:25:19.171737 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T03:25:19.171779671Z I0308 03:25:19.171691 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T03:25:19.171787171Z I0308 03:25:19.171778 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T03:25:19.172638644Z I0308 03:25:19.172119 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key" 2026-03-08T03:25:19.172638644Z I0308 03:25:19.172218 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key" certDetail="\"scheduler.openshift-kube-scheduler.svc\" [serving] validServingFor=[scheduler.openshift-kube-scheduler.svc,scheduler.openshift-kube-scheduler.svc.cluster.local] issuer=\"openshift-service-serving-signer@1772939468\" (2026-03-08 03:11:24 +0000 UTC to 2028-03-07 03:11:25 +0000 UTC (now=2026-03-08 03:25:19.172177422 +0000 UTC))" 2026-03-08T03:25:19.172638644Z I0308 03:25:19.172520 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1772940319\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1772940318\" (2026-03-08 02:25:18 +0000 UTC to 2029-03-08 02:25:18 +0000 UTC (now=2026-03-08 03:25:19.17249885 +0000 UTC))" 2026-03-08T03:25:19.172638644Z I0308 03:25:19.172595 1 secure_serving.go:213] Serving securely on [::]:10259 2026-03-08T03:25:19.172735306Z I0308 03:25:19.172683 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-08T03:25:19.177175592Z I0308 03:25:19.175173 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-08T03:25:19.177175592Z I0308 03:25:19.175940 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:25:19.177175592Z I0308 03:25:19.176006 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:25:19.177175592Z I0308 03:25:19.176161 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:25:19.177175592Z I0308 03:25:19.176198 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:25:19.177462449Z I0308 03:25:19.177417 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:25:19.177887300Z I0308 03:25:19.177686 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:25:19.177986973Z I0308 03:25:19.177960 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:25:19.178150607Z I0308 03:25:19.178125 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:25:19.178584939Z I0308 03:25:19.178552 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:25:19.182446899Z I0308 03:25:19.181813 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-08T03:25:19.182446899Z I0308 03:25:19.178562 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:25:19.182446899Z I0308 03:25:19.182281 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-08T03:25:19.184208615Z I0308 03:25:19.184161 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:25:19.184318588Z I0308 03:25:19.184282 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-08T03:25:19.184395070Z I0308 03:25:19.184297 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:25:19.187402959Z I0308 03:25:19.187348 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:25:19.195025668Z I0308 03:25:19.194975 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:25:19.203796297Z I0308 03:25:19.203719 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-03-08T03:25:19.272061899Z I0308 03:25:19.271980 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T03:25:19.272097570Z I0308 03:25:19.272000 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T03:25:19.272258674Z I0308 03:25:19.272217 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-08T03:25:19.272390727Z I0308 03:25:19.272337 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-08 03:01:07 +0000 UTC to 2026-03-09 03:01:07 +0000 UTC (now=2026-03-08 03:25:19.272307025 +0000 UTC))" 2026-03-08T03:25:19.272649204Z I0308 03:25:19.272606 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key" certDetail="\"scheduler.openshift-kube-scheduler.svc\" [serving] validServingFor=[scheduler.openshift-kube-scheduler.svc,scheduler.openshift-kube-scheduler.svc.cluster.local] issuer=\"openshift-service-serving-signer@1772939468\" (2026-03-08 03:11:24 +0000 UTC to 2028-03-07 03:11:25 +0000 UTC (now=2026-03-08 03:25:19.272588152 +0000 UTC))" 2026-03-08T03:25:19.272844069Z I0308 03:25:19.272806 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1772940319\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1772940318\" (2026-03-08 02:25:18 +0000 UTC to 2029-03-08 02:25:18 +0000 UTC (now=2026-03-08 03:25:19.272792588 +0000 UTC))" 2026-03-08T03:25:19.273083015Z I0308 03:25:19.273013 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-08 02:54:35 +0000 UTC to 2036-03-05 02:54:35 +0000 UTC (now=2026-03-08 03:25:19.273000343 +0000 UTC))" 2026-03-08T03:25:19.273117506Z I0308 03:25:19.273084 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-08 03:01:08 +0000 UTC to 2026-03-09 03:01:08 +0000 UTC (now=2026-03-08 03:25:19.273074505 +0000 UTC))" 2026-03-08T03:25:19.273142337Z I0308 03:25:19.273116 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-08 03:01:08 +0000 UTC to 2027-03-08 03:01:08 +0000 UTC (now=2026-03-08 03:25:19.273107466 +0000 UTC))" 2026-03-08T03:25:19.273179548Z I0308 03:25:19.273139 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler/kube-scheduler... 2026-03-08T03:25:19.273342102Z I0308 03:25:19.273148 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-08 03:01:09 +0000 UTC to 2027-03-08 03:01:09 +0000 UTC (now=2026-03-08 03:25:19.273139747 +0000 UTC))" 2026-03-08T03:25:19.273371913Z I0308 03:25:19.273344 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-08 03:01:06 +0000 UTC to 2036-03-05 03:01:06 +0000 UTC (now=2026-03-08 03:25:19.273333872 +0000 UTC))" 2026-03-08T03:25:19.273402744Z I0308 03:25:19.273378 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-08 03:01:07 +0000 UTC to 2026-03-09 03:01:07 +0000 UTC (now=2026-03-08 03:25:19.273370053 +0000 UTC))" 2026-03-08T03:25:19.274957184Z I0308 03:25:19.273589 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key" certDetail="\"scheduler.openshift-kube-scheduler.svc\" [serving] validServingFor=[scheduler.openshift-kube-scheduler.svc,scheduler.openshift-kube-scheduler.svc.cluster.local] issuer=\"openshift-service-serving-signer@1772939468\" (2026-03-08 03:11:24 +0000 UTC to 2028-03-07 03:11:25 +0000 UTC (now=2026-03-08 03:25:19.273574658 +0000 UTC))" 2026-03-08T03:25:19.274957184Z I0308 03:25:19.273794 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1772940319\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1772940318\" (2026-03-08 02:25:18 +0000 UTC to 2029-03-08 02:25:18 +0000 UTC (now=2026-03-08 03:25:19.273781504 +0000 UTC))" 2026-03-08T03:25:19.283791925Z I0308 03:25:19.283737 1 leaderelection.go:268] successfully acquired lease openshift-kube-scheduler/kube-scheduler 2026-03-08T03:26:19.295728985Z E0308 03:26:19.295646 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-08T03:27:12.796788017Z E0308 03:27:12.796658 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler/kube-scheduler: Get "https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler/leases/kube-scheduler?timeout=53.5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T03:27:32.293622097Z I0308 03:27:32.293466 1 leaderelection.go:297] failed to renew lease openshift-kube-scheduler/kube-scheduler: timed out waiting for the condition 2026-03-08T03:28:06.296665952Z E0308 03:28:06.296578 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T03:28:06.296665952Z E0308 03:28:06.296639 1 server.go:309] "Leaderelection lost" config/pod/openshift-kube-scheduler/openshift-kube-scheduler-master-0.json0000640000000000000000000003332715153166561025427 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-master-0","namespace":"openshift-kube-scheduler","uid":"ce589f76-c965-4a45-bc95-f6b17f90b4d0","resourceVersion":"12199","creationTimestamp":"2026-03-08T03:25:16Z","labels":{"app":"openshift-kube-scheduler","revision":"4","scheduler":"true"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-scheduler","kubernetes.io/config.hash":"1d3d45b6ce1b3764f9927e623a71adf8","kubernetes.io/config.mirror":"1d3d45b6ce1b3764f9927e623a71adf8","kubernetes.io/config.seen":"2026-03-08T03:25:16.441869174Z","kubernetes.io/config.source":"file","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"e5825447-c87e-453a-9919-ced1c52a404c","controller":true}]},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4","type":""}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-certs","type":""}}],"initContainers":[{"name":"wait-for-host-port","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["/usr/bin/timeout","30","/bin/bash","-c"],"args":["echo -n \"Waiting for port :10259 to be released.\"\nwhile [ -n \"$(ss -Htan '( sport = 10259 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["hyperkube","kube-scheduler"],"args":["--config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--feature-gates=AWSClusterHostedDNS=false,AWSEFSDriverVolumeMetrics=true,AdditionalRoutingCapabilities=false,AdminNetworkPolicy=true,AlibabaPlatform=true,AutomatedEtcdBackup=false,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BootcNodeManagement=false,BuildCSIVolumes=true,CSIDriverSharedResource=false,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DisableKubeletCloudCredentialProviders=true,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GCPLabelsTags=true,GatewayAPI=false,HardwareSpeed=true,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,IngressControllerLBSubnetsAWS=true,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,KMSv1=true,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,ManagedBootImages=true,ManagedBootImagesAWS=true,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAWS=true,MultiArchInstallAzure=false,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OnClusterBuild=true,OpenShiftPodSecurityAdmission=false,PersistentIPsForVirtualization=true,PinnedImages=false,PlatformOperators=false,PrivateHostedZoneAWS=true,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SetEIPForNLBIngressController=true,SignatureStores=false,SigstoreImageVerification=false,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiNetworks=false,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,VolumeAttributesClass=false,VolumeGroupSnapshot=false","-v=2","--tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt","--tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12"],"ports":[{"hostPort":10259,"containerPort":10259,"protocol":"TCP"}],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["cluster-kube-scheduler-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 11443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-scheduler-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:11443 -v=2\n"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:25:17Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:25:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:29:07Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:29:07Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:25:16Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-08T03:25:16Z","initContainerStatuses":[{"name":"wait-for-host-port","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-08T03:25:17Z","finishedAt":"2026-03-08T03:25:17Z","containerID":"cri-o://a5b213491f434eaf96969b81f553d91a137807d1aa05fbe10cf34450dd9f1422"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","containerID":"cri-o://a5b213491f434eaf96969b81f553d91a137807d1aa05fbe10cf34450dd9f1422","started":false}],"containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-03-08T03:28:07Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"-03-08 03:25:19.273370053 +0000 UTC))\"\nI0308 03:25:19.273589 1 tlsconfig.go:203] \"Loaded serving cert\" certName=\"serving-cert::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key\" certDetail=\"\\\"scheduler.openshift-kube-scheduler.svc\\\" [serving] validServingFor=[scheduler.openshift-kube-scheduler.svc,scheduler.openshift-kube-scheduler.svc.cluster.local] issuer=\\\"openshift-service-serving-signer@1772939468\\\" (2026-03-08 03:11:24 +0000 UTC to 2028-03-07 03:11:25 +0000 UTC (now=2026-03-08 03:25:19.273574658 +0000 UTC))\"\nI0308 03:25:19.273794 1 named_certificates.go:53] \"Loaded SNI cert\" index=0 certName=\"self-signed loopback\" certDetail=\"\\\"apiserver-loopback-client@1772940319\\\" [serving] validServingFor=[apiserver-loopback-client] issuer=\\\"apiserver-loopback-client-ca@1772940318\\\" (2026-03-08 02:25:18 +0000 UTC to 2029-03-08 02:25:18 +0000 UTC (now=2026-03-08 03:25:19.273781504 +0000 UTC))\"\nI0308 03:25:19.283737 1 leaderelection.go:268] successfully acquired lease openshift-kube-scheduler/kube-scheduler\nE0308 03:26:19.295646 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0308 03:27:12.796658 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler/kube-scheduler: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler/leases/kube-scheduler?timeout=53.5s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nI0308 03:27:32.293466 1 leaderelection.go:297] failed to renew lease openshift-kube-scheduler/kube-scheduler: timed out waiting for the condition\nE0308 03:28:06.296578 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nE0308 03:28:06.296639 1 server.go:309] \"Leaderelection lost\"\n","startedAt":"2026-03-08T03:25:18Z","finishedAt":"2026-03-08T03:28:06Z","containerID":"cri-o://1e3468b145175481bafa7c1f2e300eba2f2fe8985ff77c799fdf697ea24ae530"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","containerID":"cri-o://368b8ba6f29a3d4eee5529b66bef9da59c3b79e9dda846465669b30ae0b1c3ef","started":true,"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}]},{"name":"kube-scheduler-cert-syncer","state":{"running":{"startedAt":"2026-03-08T03:25:18Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","containerID":"cri-o://93d525f5634313a3b094a60485f81885ea0fad7e7ead5c0208227c604d3c848e","started":true,"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}]},{"name":"kube-scheduler-recovery-controller","state":{"running":{"startedAt":"2026-03-08T03:25:19Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","containerID":"cri-o://f4aba59a0dac77531c80c6a14f39f9750ecdb826fbbcf0547c734560189b6319","started":true,"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-4-master-0/installer_current.log0000640000000000000000000006564215153166561027206 0ustar00000000000000002026-03-08T03:24:45.856259263Z I0308 03:24:45.855936 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc000a29ea0 cert-secrets:0xc000a29c20 configmaps:0xc000a297c0 namespace:0xc000a295e0 optional-configmaps:0xc000a29900 optional-secrets:0xc000a29860 pod:0xc000a29680 pod-manifest-dir:0xc000a29a40 resource-dir:0xc000a299a0 revision:0xc000a29540 secrets:0xc000a29720 v:0xc000363c20] [0xc000363c20 0xc000a29540 0xc000a295e0 0xc000a29680 0xc000a299a0 0xc000a29a40 0xc000a297c0 0xc000a29900 0xc000a29860 0xc000a29720 0xc000a29ea0 0xc000a29c20] [] map[cert-configmaps:0xc000a29cc0 cert-dir:0xc000a29ea0 cert-secrets:0xc000a29c20 configmaps:0xc000a297c0 help:0xc0004c4320 kubeconfig:0xc000a294a0 log-flush-frequency:0xc000363ae0 namespace:0xc000a295e0 optional-cert-configmaps:0xc000a29e00 optional-cert-secrets:0xc000a29d60 optional-configmaps:0xc000a29900 optional-secrets:0xc000a29860 pod:0xc000a29680 pod-manifest-dir:0xc000a29a40 pod-manifests-lock-file:0xc000a29b80 resource-dir:0xc000a299a0 revision:0xc000a29540 secrets:0xc000a29720 timeout-duration:0xc000a29ae0 v:0xc000363c20 vmodule:0xc000363d60] [0xc000a294a0 0xc000a29540 0xc000a295e0 0xc000a29680 0xc000a29720 0xc000a297c0 0xc000a29860 0xc000a29900 0xc000a299a0 0xc000a29a40 0xc000a29ae0 0xc000a29b80 0xc000a29c20 0xc000a29cc0 0xc000a29d60 0xc000a29e00 0xc000a29ea0 0xc000363ae0 0xc000363c20 0xc000363d60 0xc0004c4320] [0xc000a29cc0 0xc000a29ea0 0xc000a29c20 0xc000a297c0 0xc0004c4320 0xc000a294a0 0xc000363ae0 0xc000a295e0 0xc000a29e00 0xc000a29d60 0xc000a29900 0xc000a29860 0xc000a29680 0xc000a29a40 0xc000a29b80 0xc000a299a0 0xc000a29540 0xc000a29720 0xc000a29ae0 0xc000363c20 0xc000363d60] map[104:0xc0004c4320 118:0xc000363c20] [] -1 0 0xc0002b91d0 true 0x223d9a0 []} 2026-03-08T03:24:45.856426847Z I0308 03:24:45.856307 1 cmd.go:96] (*installerpod.InstallOptions)(0xc00087e4e0)({ 2026-03-08T03:24:45.856426847Z KubeConfig: (string) "", 2026-03-08T03:24:45.856426847Z KubeClient: (kubernetes.Interface) , 2026-03-08T03:24:45.856426847Z Revision: (string) (len=1) "4", 2026-03-08T03:24:45.856426847Z NodeName: (string) "", 2026-03-08T03:24:45.856426847Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-03-08T03:24:45.856426847Z Clock: (clock.RealClock) { 2026-03-08T03:24:45.856426847Z }, 2026-03-08T03:24:45.856426847Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-03-08T03:24:45.856426847Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T03:24:45.856426847Z (string) (len=31) "localhost-recovery-client-token" 2026-03-08T03:24:45.856426847Z }, 2026-03-08T03:24:45.856426847Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T03:24:45.856426847Z (string) (len=12) "serving-cert" 2026-03-08T03:24:45.856426847Z }, 2026-03-08T03:24:45.856426847Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-03-08T03:24:45.856426847Z (string) (len=18) "kube-scheduler-pod", 2026-03-08T03:24:45.856426847Z (string) (len=6) "config", 2026-03-08T03:24:45.856426847Z (string) (len=17) "serviceaccount-ca", 2026-03-08T03:24:45.856426847Z (string) (len=20) "scheduler-kubeconfig", 2026-03-08T03:24:45.856426847Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-03-08T03:24:45.856426847Z }, 2026-03-08T03:24:45.856426847Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T03:24:45.856426847Z (string) (len=16) "policy-configmap" 2026-03-08T03:24:45.856426847Z }, 2026-03-08T03:24:45.856426847Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-03-08T03:24:45.856426847Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-03-08T03:24:45.856426847Z }, 2026-03-08T03:24:45.856426847Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-08T03:24:45.856426847Z CertConfigMapNamePrefixes: ([]string) , 2026-03-08T03:24:45.856426847Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-03-08T03:24:45.856426847Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-03-08T03:24:45.856426847Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-08T03:24:45.856426847Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-08T03:24:45.856426847Z Timeout: (time.Duration) 2m0s, 2026-03-08T03:24:45.856426847Z StaticPodManifestsLockFile: (string) "", 2026-03-08T03:24:45.856426847Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-08T03:24:45.856426847Z KubeletVersion: (string) "" 2026-03-08T03:24:45.856426847Z }) 2026-03-08T03:24:45.857645519Z I0308 03:24:45.857604 1 cmd.go:413] Getting controller reference for node master-0 2026-03-08T03:24:46.011666349Z I0308 03:24:46.010845 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-08T03:24:46.011666349Z I0308 03:24:46.010971 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-08T03:24:46.011666349Z I0308 03:24:46.010997 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-08T03:24:46.028814357Z I0308 03:24:46.028724 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-08T03:25:16.028966796Z I0308 03:25:16.028844 1 cmd.go:524] Getting installer pods for node master-0 2026-03-08T03:25:16.032892928Z I0308 03:25:16.032837 1 cmd.go:542] Latest installer revision for node master-0 is: 4 2026-03-08T03:25:16.032892928Z I0308 03:25:16.032867 1 cmd.go:431] Querying kubelet version for node master-0 2026-03-08T03:25:16.035432145Z I0308 03:25:16.035359 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0 2026-03-08T03:25:16.035432145Z I0308 03:25:16.035414 1 cmd.go:293] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4" ... 2026-03-08T03:25:16.035633970Z I0308 03:25:16.035600 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4" ... 2026-03-08T03:25:16.035633970Z I0308 03:25:16.035622 1 cmd.go:229] Getting secrets ... 2026-03-08T03:25:16.039396388Z I0308 03:25:16.039325 1 copy.go:32] Got secret openshift-kube-scheduler/localhost-recovery-client-token-4 2026-03-08T03:25:16.042640093Z I0308 03:25:16.042571 1 copy.go:32] Got secret openshift-kube-scheduler/serving-cert-4 2026-03-08T03:25:16.042677534Z I0308 03:25:16.042650 1 cmd.go:242] Getting config maps ... 2026-03-08T03:25:16.045426246Z I0308 03:25:16.045367 1 copy.go:60] Got configMap openshift-kube-scheduler/config-4 2026-03-08T03:25:16.047498540Z I0308 03:25:16.047321 1 copy.go:60] Got configMap openshift-kube-scheduler/kube-scheduler-cert-syncer-kubeconfig-4 2026-03-08T03:25:16.049128942Z I0308 03:25:16.049071 1 copy.go:60] Got configMap openshift-kube-scheduler/kube-scheduler-pod-4 2026-03-08T03:25:16.051187946Z I0308 03:25:16.051115 1 copy.go:60] Got configMap openshift-kube-scheduler/scheduler-kubeconfig-4 2026-03-08T03:25:16.053413864Z I0308 03:25:16.053377 1 copy.go:60] Got configMap openshift-kube-scheduler/serviceaccount-ca-4 2026-03-08T03:25:16.057226334Z I0308 03:25:16.057173 1 copy.go:52] Failed to get config map openshift-kube-scheduler/policy-configmap-4: configmaps "policy-configmap-4" not found 2026-03-08T03:25:16.057226334Z I0308 03:25:16.057203 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/secrets/localhost-recovery-client-token" ... 2026-03-08T03:25:16.057453130Z I0308 03:25:16.057411 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/secrets/localhost-recovery-client-token/namespace" ... 2026-03-08T03:25:16.057626794Z I0308 03:25:16.057587 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/secrets/localhost-recovery-client-token/token" ... 2026-03-08T03:25:16.057722337Z I0308 03:25:16.057694 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/secrets/localhost-recovery-client-token/ca.crt" ... 2026-03-08T03:25:16.057846460Z I0308 03:25:16.057809 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/secrets/serving-cert" ... 2026-03-08T03:25:16.058011594Z I0308 03:25:16.057946 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/secrets/serving-cert/tls.crt" ... 2026-03-08T03:25:16.058084036Z I0308 03:25:16.058057 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/secrets/serving-cert/tls.key" ... 2026-03-08T03:25:16.058200619Z I0308 03:25:16.058163 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/config" ... 2026-03-08T03:25:16.058364403Z I0308 03:25:16.058338 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/config/config.yaml" ... 2026-03-08T03:25:16.058473416Z I0308 03:25:16.058445 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/kube-scheduler-cert-syncer-kubeconfig" ... 2026-03-08T03:25:16.058558978Z I0308 03:25:16.058531 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig" ... 2026-03-08T03:25:16.060003736Z I0308 03:25:16.058649 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/kube-scheduler-pod" ... 2026-03-08T03:25:16.060003736Z I0308 03:25:16.058740 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/kube-scheduler-pod/pod.yaml" ... 2026-03-08T03:25:16.060003736Z I0308 03:25:16.058872 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/kube-scheduler-pod/version" ... 2026-03-08T03:25:16.060003736Z I0308 03:25:16.059007 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/kube-scheduler-pod/forceRedeploymentReason" ... 2026-03-08T03:25:16.060003736Z I0308 03:25:16.059096 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/scheduler-kubeconfig" ... 2026-03-08T03:25:16.060003736Z I0308 03:25:16.059165 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/scheduler-kubeconfig/kubeconfig" ... 2026-03-08T03:25:16.060003736Z I0308 03:25:16.059268 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/serviceaccount-ca" ... 2026-03-08T03:25:16.060003736Z I0308 03:25:16.059334 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/serviceaccount-ca/ca-bundle.crt" ... 2026-03-08T03:25:16.060003736Z I0308 03:25:16.059438 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-scheduler-certs" ... 2026-03-08T03:25:16.060003736Z I0308 03:25:16.059492 1 cmd.go:229] Getting secrets ... 2026-03-08T03:25:16.235648831Z I0308 03:25:16.235119 1 copy.go:32] Got secret openshift-kube-scheduler/kube-scheduler-client-cert-key 2026-03-08T03:25:16.235648831Z I0308 03:25:16.235188 1 cmd.go:242] Getting config maps ... 2026-03-08T03:25:16.235648831Z I0308 03:25:16.235204 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-certs/secrets/kube-scheduler-client-cert-key" ... 2026-03-08T03:25:16.235648831Z I0308 03:25:16.235477 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-certs/secrets/kube-scheduler-client-cert-key/tls.crt" ... 2026-03-08T03:25:16.236965615Z I0308 03:25:16.235689 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-certs/secrets/kube-scheduler-client-cert-key/tls.key" ... 2026-03-08T03:25:16.236965615Z I0308 03:25:16.235969 1 cmd.go:335] Getting pod configmaps/kube-scheduler-pod-4 -n openshift-kube-scheduler 2026-03-08T03:25:16.431937055Z I0308 03:25:16.431838 1 cmd.go:351] Creating directory for static pod manifest "/etc/kubernetes/manifests" ... 2026-03-08T03:25:16.431971585Z I0308 03:25:16.431926 1 cmd.go:379] Writing a pod under "kube-scheduler-pod.yaml" key 2026-03-08T03:25:16.431971585Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"openshift-kube-scheduler","namespace":"openshift-kube-scheduler","creationTimestamp":null,"labels":{"app":"openshift-kube-scheduler","revision":"4","scheduler":"true"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-scheduler","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-certs"}}],"initContainers":[{"name":"wait-for-host-port","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["/usr/bin/timeout","30","/bin/bash","-c"],"args":["echo -n \"Waiting for port :10259 to be released.\"\nwhile [ -n \"$(ss -Htan '( sport = 10259 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["hyperkube","kube-scheduler"],"args":["--config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--feature-gates=AWSClusterHostedDNS=false,AWSEFSDriverVolumeMetrics=true,AdditionalRoutingCapabilities=false,AdminNetworkPolicy=true,AlibabaPlatform=true,AutomatedEtcdBackup=false,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BootcNodeManagement=false,BuildCSIVolumes=true,CSIDriverSharedResource=false,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DisableKubeletCloudCredentialProviders=true,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GCPLabelsTags=true,GatewayAPI=false,HardwareSpeed=true,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,IngressControllerLBSubnetsAWS=true,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,KMSv1=true,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,ManagedBootImages=true,ManagedBootImagesAWS=true,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAWS=true,MultiArchInstallAzure=false,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OnClusterBuild=true,OpenShiftPodSecurityAdmission=false,PersistentIPsForVirtualization=true,PinnedImages=false,PlatformOperators=false,PrivateHostedZoneAWS=true,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SetEIPForNLBIngressController=true,SignatureStores=false,SigstoreImageVerification=false,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiNetworks=false,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,VolumeAttributesClass=false,VolumeGroupSnapshot=false","-v=2","--tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt","--tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12"],"ports":[{"containerPort":10259}],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45},"readinessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["cluster-kube-scheduler-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 11443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-scheduler-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:11443 -v=2\n"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} 2026-03-08T03:25:16.439412660Z I0308 03:25:16.439336 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/kube-scheduler-pod.yaml" ... 2026-03-08T03:25:16.439682427Z I0308 03:25:16.439629 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/kube-scheduler-pod.yaml" ... 2026-03-08T03:25:16.439682427Z I0308 03:25:16.439652 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/kube-scheduler-pod.yaml" ... 2026-03-08T03:25:16.439682427Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"openshift-kube-scheduler","namespace":"openshift-kube-scheduler","creationTimestamp":null,"labels":{"app":"openshift-kube-scheduler","revision":"4","scheduler":"true"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-scheduler","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-certs"}}],"initContainers":[{"name":"wait-for-host-port","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["/usr/bin/timeout","30","/bin/bash","-c"],"args":["echo -n \"Waiting for port :10259 to be released.\"\nwhile [ -n \"$(ss -Htan '( sport = 10259 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["hyperkube","kube-scheduler"],"args":["--config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--feature-gates=AWSClusterHostedDNS=false,AWSEFSDriverVolumeMetrics=true,AdditionalRoutingCapabilities=false,AdminNetworkPolicy=true,AlibabaPlatform=true,AutomatedEtcdBackup=false,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BootcNodeManagement=false,BuildCSIVolumes=true,CSIDriverSharedResource=false,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DisableKubeletCloudCredentialProviders=true,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GCPLabelsTags=true,GatewayAPI=false,HardwareSpeed=true,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,IngressControllerLBSubnetsAWS=true,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,KMSv1=true,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,ManagedBootImages=true,ManagedBootImagesAWS=true,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAWS=true,MultiArchInstallAzure=false,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OnClusterBuild=true,OpenShiftPodSecurityAdmission=false,PersistentIPsForVirtualization=true,PinnedImages=false,PlatformOperators=false,PrivateHostedZoneAWS=true,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SetEIPForNLBIngressController=true,SignatureStores=false,SigstoreImageVerification=false,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiNetworks=false,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,VolumeAttributesClass=false,VolumeGroupSnapshot=false","-v=2","--tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt","--tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12"],"ports":[{"containerPort":10259}],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45},"readinessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["cluster-kube-scheduler-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 11443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-scheduler-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:11443 -v=2\n"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} config/pod/kube-system/bootstrap-kube-controller-manager-master-0.json0000640000000000000000000003045015153166561024625 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-controller-manager-master-0","namespace":"kube-system","uid":"9a6480d3-7182-439a-81af-17c2a49c776e","resourceVersion":"12361","creationTimestamp":"2026-03-08T03:10:41Z","labels":{"openshift.io/component":"controller-manager","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"f78c05e1499b533b83f091333d61f045","kubernetes.io/config.mirror":"f78c05e1499b533b83f091333d61f045","kubernetes.io/config.seen":"2026-03-08T03:08:59.045955103Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"e5825447-c87e-453a-9919-ced1c52a404c","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"etc-kubernetes-cloud","hostPath":{"path":"/etc/kubernetes/cloud","type":""}},{"name":"config","hostPath":{"path":"/etc/kubernetes/bootstrap-configs","type":""}},{"name":"ssl-certs-host","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["hyperkube","kube-controller-manager"],"args":["--openshift-config=/etc/kubernetes/config/kube-controller-manager-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2","--allocate-node-cidrs=false","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--cert-dir=/var/run/kubernetes","--cloud-provider=external","--cluster-cidr=10.128.0.0/16","--cluster-signing-cert-file=/etc/kubernetes/secrets/kubelet-signer.crt","--cluster-signing-duration=720h","--cluster-signing-key-file=/etc/kubernetes/secrets/kubelet-signer.key","--controllers=*","--controllers=-bootstrapsigner","--controllers=-tokencleaner","--controllers=-ttl","--enable-dynamic-provisioning=true","--feature-gates=AWSClusterHostedDNS=false","--feature-gates=AWSEFSDriverVolumeMetrics=true","--feature-gates=AdditionalRoutingCapabilities=false","--feature-gates=AdminNetworkPolicy=true","--feature-gates=AlibabaPlatform=true","--feature-gates=AutomatedEtcdBackup=false","--feature-gates=AzureWorkloadIdentity=true","--feature-gates=BareMetalLoadBalancer=true","--feature-gates=BootcNodeManagement=false","--feature-gates=BuildCSIVolumes=true","--feature-gates=CSIDriverSharedResource=false","--feature-gates=ChunkSizeMiB=true","--feature-gates=CloudDualStackNodeIPs=true","--feature-gates=ClusterAPIInstall=false","--feature-gates=ClusterAPIInstallIBMCloud=false","--feature-gates=ClusterMonitoringConfig=false","--feature-gates=ConsolePluginContentSecurityPolicy=false","--feature-gates=DNSNameResolver=false","--feature-gates=DisableKubeletCloudCredentialProviders=true","--feature-gates=DynamicResourceAllocation=false","--feature-gates=EtcdBackendQuota=false","--feature-gates=EventedPLEG=false","--feature-gates=Example=false","--feature-gates=ExternalOIDC=false","--feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false","--feature-gates=GCPClusterHostedDNS=false","--feature-gates=GCPLabelsTags=true","--feature-gates=GatewayAPI=false","--feature-gates=HardwareSpeed=true","--feature-gates=ImageStreamImportMode=false","--feature-gates=IngressControllerDynamicConfigurationManager=false","--feature-gates=IngressControllerLBSubnetsAWS=true","--feature-gates=InsightsConfig=false","--feature-gates=InsightsConfigAPI=false","--feature-gates=InsightsOnDemandDataGather=false","--feature-gates=InsightsRuntimeExtractor=false","--feature-gates=KMSv1=true","--feature-gates=MachineAPIMigration=false","--feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false","--feature-gates=MachineAPIProviderOpenStack=false","--feature-gates=MachineConfigNodes=false","--feature-gates=ManagedBootImages=true","--feature-gates=ManagedBootImagesAWS=true","--feature-gates=MaxUnavailableStatefulSet=false","--feature-gates=MetricsCollectionProfiles=false","--feature-gates=MinimumKubeletVersion=false","--feature-gates=MixedCPUsAllocation=false","--feature-gates=MultiArchInstallAWS=true","--feature-gates=MultiArchInstallAzure=false","--feature-gates=MultiArchInstallGCP=true","--feature-gates=NetworkDiagnosticsConfig=true","--feature-gates=NetworkLiveMigration=true","--feature-gates=NetworkSegmentation=true","--feature-gates=NewOLM=true","--feature-gates=NodeDisruptionPolicy=true","--feature-gates=NodeSwap=false","--feature-gates=NutanixMultiSubnets=false","--feature-gates=OVNObservability=false","--feature-gates=OnClusterBuild=true","--feature-gates=OpenShiftPodSecurityAdmission=false","--feature-gates=PersistentIPsForVirtualization=true","--feature-gates=PinnedImages=false","--feature-gates=PlatformOperators=false","--feature-gates=PrivateHostedZoneAWS=true","--feature-gates=ProcMountType=false","--feature-gates=RouteAdvertisements=false","--feature-gates=RouteExternalCertificate=false","--feature-gates=ServiceAccountTokenNodeBinding=false","--feature-gates=SetEIPForNLBIngressController=true","--feature-gates=SignatureStores=false","--feature-gates=SigstoreImageVerification=false","--feature-gates=StreamingCollectionEncodingToJSON=true","--feature-gates=StreamingCollectionEncodingToProtobuf=true","--feature-gates=TranslateStreamCloseWebsocketRequests=false","--feature-gates=UpgradeStatus=false","--feature-gates=UserNamespacesPodSecurityStandards=false","--feature-gates=UserNamespacesSupport=false","--feature-gates=VSphereControlPlaneMachineSet=true","--feature-gates=VSphereDriverConfiguration=true","--feature-gates=VSphereMultiNetworks=false","--feature-gates=VSphereMultiVCenters=true","--feature-gates=VSphereStaticIPs=true","--feature-gates=ValidatingAdmissionPolicy=true","--feature-gates=VolumeAttributesClass=false","--feature-gates=VolumeGroupSnapshot=false","--flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec","--kube-api-burst=300","--kube-api-qps=150","--leader-elect-renew-deadline=12s","--leader-elect-resource-lock=leases","--leader-elect-retry-period=3s","--leader-elect=true","--pv-recycler-pod-template-filepath-hostpath=","--pv-recycler-pod-template-filepath-nfs=","--root-ca-file=/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt","--secure-port=10257","--service-account-private-key-file=/etc/kubernetes/secrets/service-account.key","--service-cluster-ip-range=172.30.0.0/16","--use-service-account-credentials=true"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","command":["cluster-policy-controller","start"],"args":["--config=/etc/kubernetes/config/cluster-policy-controller-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--namespace=$(POD_NAMESPACE)","--v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:25:49Z","reason":"ContainersNotReady","message":"containers with unready status: [kube-controller-manager]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:25:49Z","reason":"ContainersNotReady","message":"containers with unready status: [kube-controller-manager]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-08T03:11:04Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2026-03-08T03:30:33Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-08T03:19:04Z","finishedAt":"2026-03-08T03:30:32Z","containerID":"cri-o://85ebc2aadcc00fbddf926f6ab17ab8c204935ad575ebd07cf7adcfc06b4a6c08"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","containerID":"cri-o://22f31e2b7f0321897dacca58338ef528e1d06507bc628197034c61c7576b258f","started":true},{"name":"kube-controller-manager","state":{"waiting":{"reason":"CrashLoopBackOff","message":"back-off 5m0s restarting failed container=kube-controller-manager pod=bootstrap-kube-controller-manager-master-0_kube-system(f78c05e1499b533b83f091333d61f045)"}},"lastState":{"terminated":{"exitCode":2,"reason":"Error","startedAt":"2026-03-08T03:28:31Z","finishedAt":"2026-03-08T03:28:56Z","containerID":"cri-o://f6002d889d471a68aa7f22937f49a82a2b4b24ab138311c194765fb16289177d"}},"ready":false,"restartCount":6,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","containerID":"cri-o://f6002d889d471a68aa7f22937f49a82a2b4b24ab138311c194765fb16289177d","started":false}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000004752415153166561044734 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-86d7cdfdfb-xtwpr2026-03-08T03:30:37.043943761Z I0308 03:30:37.043326 1 base_controller.go:76] Waiting for caches to sync for TargetConfigController 2026-03-08T03:30:37.061974283Z I0308 03:30:37.058597 1 base_controller.go:76] Waiting for caches to sync for kube-controller-manager-InstallerState 2026-03-08T03:30:37.061974283Z I0308 03:30:37.058683 1 base_controller.go:76] Waiting for caches to sync for kube-controller-manager 2026-03-08T03:30:37.061974283Z I0308 03:30:37.058719 1 base_controller.go:76] Waiting for caches to sync for CertRotationController 2026-03-08T03:30:37.065662437Z I0308 03:30:37.065608 1 base_controller.go:76] Waiting for caches to sync for StatusSyncer_kube-controller-manager 2026-03-08T03:30:37.065694178Z I0308 03:30:37.065664 1 base_controller.go:76] Waiting for caches to sync for kube-controller-manager-StaticPodState 2026-03-08T03:30:37.065694178Z I0308 03:30:37.065689 1 base_controller.go:76] Waiting for caches to sync for PruneController 2026-03-08T03:30:37.065726019Z I0308 03:30:37.065701 1 base_controller.go:76] Waiting for caches to sync for kube-controller-manager-Node 2026-03-08T03:30:37.065845122Z I0308 03:30:37.065816 1 base_controller.go:76] Waiting for caches to sync for kube-controller-manager-operator-UnsupportedConfigOverrides 2026-03-08T03:30:37.065879723Z I0308 03:30:37.065853 1 base_controller.go:76] Waiting for caches to sync for LoggingSyncer 2026-03-08T03:30:37.065879723Z I0308 03:30:37.065873 1 base_controller.go:76] Waiting for caches to sync for GuardController 2026-03-08T03:30:37.065924304Z I0308 03:30:37.065891 1 base_controller.go:76] Waiting for caches to sync for BackingResourceController-StaticResources 2026-03-08T03:30:37.066327924Z I0308 03:30:37.066307 1 base_controller.go:76] Waiting for caches to sync for KubeControllerManagerStaticResources-StaticResources 2026-03-08T03:30:37.066387836Z I0308 03:30:37.066352 1 base_controller.go:76] Waiting for caches to sync for Installer 2026-03-08T03:30:37.078284511Z I0308 03:30:37.077986 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T03:30:37.078284511Z I0308 03:30:37.078055 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-08T03:30:37.078284511Z I0308 03:30:37.078141 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T03:30:37.167943447Z I0308 03:30:37.165955 1 base_controller.go:82] Caches are synced for kube-controller-manager-Node 2026-03-08T03:30:37.167943447Z I0308 03:30:37.165986 1 base_controller.go:119] Starting #1 worker of kube-controller-manager-Node controller ... 2026-03-08T03:30:37.169049656Z I0308 03:30:37.168085 1 base_controller.go:82] Caches are synced for LoggingSyncer 2026-03-08T03:30:37.169049656Z I0308 03:30:37.168106 1 base_controller.go:119] Starting #1 worker of LoggingSyncer controller ... 2026-03-08T03:30:37.169049656Z I0308 03:30:37.168300 1 base_controller.go:82] Caches are synced for GuardController 2026-03-08T03:30:37.169049656Z I0308 03:30:37.168306 1 base_controller.go:119] Starting #1 worker of GuardController controller ... 2026-03-08T03:30:37.170185695Z I0308 03:30:37.169868 1 base_controller.go:82] Caches are synced for kube-controller-manager-InstallerState 2026-03-08T03:30:37.170185695Z I0308 03:30:37.169880 1 base_controller.go:119] Starting #1 worker of kube-controller-manager-InstallerState controller ... 2026-03-08T03:30:37.170185695Z I0308 03:30:37.170044 1 base_controller.go:82] Caches are synced for kube-controller-manager-StaticPodState 2026-03-08T03:30:37.170185695Z I0308 03:30:37.170049 1 base_controller.go:119] Starting #1 worker of kube-controller-manager-StaticPodState controller ... 2026-03-08T03:30:37.170185695Z I0308 03:30:37.170061 1 base_controller.go:82] Caches are synced for StatusSyncer_kube-controller-manager 2026-03-08T03:30:37.170185695Z I0308 03:30:37.170066 1 base_controller.go:119] Starting #1 worker of StatusSyncer_kube-controller-manager controller ... 2026-03-08T03:30:37.172235107Z I0308 03:30:37.170783 1 base_controller.go:82] Caches are synced for PruneController 2026-03-08T03:30:37.172235107Z I0308 03:30:37.170796 1 base_controller.go:119] Starting #1 worker of PruneController controller ... 2026-03-08T03:30:37.174046924Z I0308 03:30:37.174005 1 base_controller.go:82] Caches are synced for kube-controller-manager-operator-UnsupportedConfigOverrides 2026-03-08T03:30:37.174060724Z I0308 03:30:37.174043 1 base_controller.go:119] Starting #1 worker of kube-controller-manager-operator-UnsupportedConfigOverrides controller ... 2026-03-08T03:30:37.179950415Z I0308 03:30:37.179893 1 prune_controller.go:277] Nothing to prune 2026-03-08T03:30:37.234943284Z I0308 03:30:37.234699 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:30:37.244239852Z I0308 03:30:37.244159 1 base_controller.go:82] Caches are synced for MissingStaticPodController 2026-03-08T03:30:37.244239852Z I0308 03:30:37.244192 1 base_controller.go:119] Starting #1 worker of MissingStaticPodController controller ... 2026-03-08T03:30:37.245040863Z I0308 03:30:37.244963 1 base_controller.go:82] Caches are synced for WorkerLatencyProfile 2026-03-08T03:30:37.245040863Z I0308 03:30:37.244991 1 base_controller.go:119] Starting #1 worker of WorkerLatencyProfile controller ... 2026-03-08T03:30:37.434243007Z I0308 03:30:37.434151 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:30:37.635318727Z I0308 03:30:37.635230 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:30:37.835527886Z I0308 03:30:37.835410 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:30:37.866940643Z I0308 03:30:37.866822 1 base_controller.go:82] Caches are synced for CertRotationController 2026-03-08T03:30:37.866940643Z I0308 03:30:37.866884 1 base_controller.go:119] Starting #1 worker of CertRotationController controller ... 2026-03-08T03:30:38.040453443Z I0308 03:30:38.040368 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:30:38.234402344Z I0308 03:30:38.234301 1 request.go:700] Waited for 1.189795537s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/serviceaccounts?limit=500&resourceVersion=0 2026-03-08T03:30:38.236525217Z I0308 03:30:38.236441 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:30:38.266423887Z I0308 03:30:38.266327 1 base_controller.go:82] Caches are synced for BackingResourceController-StaticResources 2026-03-08T03:30:38.266534280Z I0308 03:30:38.266505 1 base_controller.go:119] Starting #1 worker of BackingResourceController-StaticResources controller ... 2026-03-08T03:30:38.436801598Z I0308 03:30:38.436715 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:30:38.444046589Z I0308 03:30:38.444001 1 base_controller.go:82] Caches are synced for RevisionController 2026-03-08T03:30:38.444215214Z I0308 03:30:38.444185 1 base_controller.go:119] Starting #1 worker of RevisionController controller ... 2026-03-08T03:30:38.466719568Z I0308 03:30:38.466672 1 base_controller.go:82] Caches are synced for Installer 2026-03-08T03:30:38.466818820Z I0308 03:30:38.466795 1 base_controller.go:119] Starting #1 worker of Installer controller ... 2026-03-08T03:30:38.634786641Z I0308 03:30:38.634688 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:30:38.666767722Z I0308 03:30:38.666647 1 base_controller.go:82] Caches are synced for KubeControllerManagerStaticResources-StaticResources 2026-03-08T03:30:38.666767722Z I0308 03:30:38.666676 1 base_controller.go:119] Starting #1 worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-08T03:30:38.858829887Z I0308 03:30:38.858715 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:30:38.942606996Z I0308 03:30:38.942495 1 base_controller.go:82] Caches are synced for GarbageCollectorWatcherController 2026-03-08T03:30:38.942606996Z I0308 03:30:38.942581 1 base_controller.go:119] Starting #1 worker of GarbageCollectorWatcherController controller ... 2026-03-08T03:30:38.943483918Z I0308 03:30:38.943400 1 base_controller.go:82] Caches are synced for ConfigObserver 2026-03-08T03:30:38.943483918Z I0308 03:30:38.943428 1 base_controller.go:119] Starting #1 worker of ConfigObserver controller ... 2026-03-08T03:30:38.943483918Z I0308 03:30:38.943469 1 base_controller.go:82] Caches are synced for SATokenSignerController 2026-03-08T03:30:38.943540810Z I0308 03:30:38.943479 1 base_controller.go:119] Starting #1 worker of SATokenSignerController controller ... 2026-03-08T03:30:39.036598193Z I0308 03:30:39.036516 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:30:39.236548844Z I0308 03:30:39.234886 1 request.go:700] Waited for 2.168589839s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-config-managed/secrets?limit=500&resourceVersion=0 2026-03-08T03:30:39.238068622Z I0308 03:30:39.237992 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T03:30:39.244375060Z I0308 03:30:39.244276 1 base_controller.go:82] Caches are synced for TargetConfigController 2026-03-08T03:30:39.244375060Z I0308 03:30:39.244322 1 base_controller.go:119] Starting #1 worker of TargetConfigController controller ... 2026-03-08T03:30:39.267512080Z I0308 03:30:39.267441 1 base_controller.go:82] Caches are synced for kube-controller-manager 2026-03-08T03:30:39.267602002Z I0308 03:30:39.267579 1 base_controller.go:119] Starting #1 worker of kube-controller-manager controller ... 2026-03-08T03:30:40.434586204Z I0308 03:30:40.434517 1 request.go:700] Waited for 1.490723766s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dopenshift-kube-apiserver 2026-03-08T03:30:40.836846377Z I0308 03:30:40.836773 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-03-08T03:30:41.235766457Z I0308 03:30:41.235624 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-08T03:30:41.235987353Z E0308 03:30:41.235893 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-08T03:30:42.435570562Z I0308 03:30:42.435448 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-08T03:30:42.435782207Z E0308 03:30:42.435718 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-08T03:30:43.835814070Z I0308 03:30:43.835702 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-08T03:30:43.836125358Z E0308 03:30:43.836059 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-08T03:30:45.235713711Z I0308 03:30:45.235609 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-08T03:30:45.235999628Z E0308 03:30:45.235900 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-08T03:30:46.437443433Z I0308 03:30:46.437351 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-08T03:30:46.437792081Z E0308 03:30:46.437741 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-08T03:30:47.636759585Z I0308 03:30:47.636640 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-08T03:30:47.637171126Z E0308 03:30:47.637098 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-08T03:30:48.836989301Z I0308 03:30:48.836861 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-08T03:30:48.837488563Z E0308 03:30:48.837387 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-08T03:30:49.836363762Z I0308 03:30:49.836227 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-08T03:30:49.836538756Z E0308 03:30:49.836476 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-08T03:30:50.487737098Z I0308 03:30:50.487612 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-08T03:30:50.488016435Z E0308 03:30:50.487898 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-08T03:30:51.120536320Z I0308 03:30:51.120392 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/kube-controller-manager version "operator" changed from "" to "4.18.34" 2026-03-08T03:30:51.120536320Z I0308 03:30:51.120459 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/kube-controller-manager version "kube-controller-manager" changed from "" to "1.31.14" 2026-03-08T03:30:51.121294390Z I0308 03:30:51.121223 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"versions":[{"name":"raw-internal","version":"4.18.34"},{"name":"operator","version":"4.18.34"},{"name":"kube-controller-manager","version":"1.31.14"}]}} 2026-03-08T03:30:51.136356417Z I0308 03:30:51.136220 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: status.versions changed from [{"raw-internal" "4.18.34"}] to [{"raw-internal" "4.18.34"} {"operator" "4.18.34"} {"kube-controller-manager" "1.31.14"}] 2026-03-08T03:30:51.136631194Z I0308 03:30:51.136542 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/kube-controller-manager version "kube-controller-manager" changed from "" to "1.31.14" 2026-03-08T03:30:51.136631194Z I0308 03:30:51.136588 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/kube-controller-manager version "operator" changed from "" to "4.18.34" 2026-03-08T03:30:51.137456425Z I0308 03:30:51.137197 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"versions":[{"name":"raw-internal","version":"4.18.34"},{"name":"kube-controller-manager","version":"1.31.14"},{"name":"operator","version":"4.18.34"}]}} 2026-03-08T03:30:51.147510787Z E0308 03:30:51.147390 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_kube-controller-manager reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"kube-controller-manager\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-08T03:30:51.236242511Z I0308 03:30:51.236125 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase kube-controller-manager-operator_previous.log0000640000000000000000000010614515153166561045121 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-86d7cdfdfb-xtwpr2026-03-08T03:30:01.528017752Z (string) (len=10) "csr-signer" 2026-03-08T03:30:01.528017752Z }, 2026-03-08T03:30:01.528017752Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-08T03:30:01.528017752Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-08T03:30:01.528017752Z (string) (len=20) "aggregator-client-ca", 2026-03-08T03:30:01.528017752Z (string) (len=9) "client-ca" 2026-03-08T03:30:01.528017752Z }, 2026-03-08T03:30:01.528017752Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T03:30:01.528017752Z (string) (len=17) "trusted-ca-bundle" 2026-03-08T03:30:01.528017752Z }, 2026-03-08T03:30:01.528017752Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-08T03:30:01.528017752Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-08T03:30:01.528017752Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-08T03:30:01.528017752Z Timeout: (time.Duration) 2m0s, 2026-03-08T03:30:01.528017752Z StaticPodManifestsLockFile: (string) "", 2026-03-08T03:30:01.528017752Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-08T03:30:01.528017752Z KubeletVersion: (string) "" 2026-03-08T03:30:01.528017752Z }) 2026-03-08T03:30:01.528017752Z I0308 03:25:17.454069 1 cmd.go:413] Getting controller reference for node master-0 2026-03-08T03:30:01.528017752Z I0308 03:25:17.463026 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-08T03:30:01.528017752Z I0308 03:25:17.463113 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-08T03:30:01.528017752Z I0308 03:25:17.463142 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-08T03:30:01.528017752Z I0308 03:25:17.465446 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-08T03:30:01.528017752Z I0308 03:25:47.465506 1 cmd.go:524] Getting installer pods for node master-0 2026-03-08T03:30:01.528017752Z F0308 03:26:01.467001 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T03:30:01.528017752Z W0308 03:30:01.527436 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-03-08T03:30:01.528017752Z I0308 03:30:01.527413 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' installer errors: installer: icy-controller-config", 2026-03-08T03:30:01.528017752Z (string) (len=29) "controller-manager-kubeconfig", 2026-03-08T03:30:01.528017752Z (string) (len=38) "kube-controller-cert-syncer-kubeconfig", 2026-03-08T03:30:01.528017752Z (string) (len=17) "serviceaccount-ca", 2026-03-08T03:30:01.528017752Z (string) (len=10) "service-ca", 2026-03-08T03:30:01.528017752Z (string) (len=15) "recycler-config" 2026-03-08T03:30:01.528017752Z }, 2026-03-08T03:30:01.528017752Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T03:30:01.528017752Z (string) (len=12) "cloud-config" 2026-03-08T03:30:01.528017752Z }, 2026-03-08T03:30:01.528017752Z CertSecretNames: ([]string) (len=2 cap=2) { 2026-03-08T03:30:01.528017752Z (string) (len=39) "kube-controller-manager-client-cert-key", 2026-03-08T03:30:01.528017752Z (string) (len=10) "csr-signer" 2026-03-08T03:30:01.528017752Z }, 2026-03-08T03:30:01.528017752Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-08T03:30:01.528017752Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-08T03:30:01.528017752Z (string) (len=20) "aggregator-client-ca", 2026-03-08T03:30:01.528017752Z (string) (len=9) "client-ca" 2026-03-08T03:30:01.528017752Z }, 2026-03-08T03:30:01.528017752Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T03:30:01.528297719Z (string) (len=17) "trusted-ca-bundle" 2026-03-08T03:30:01.528297719Z }, 2026-03-08T03:30:01.528297719Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-08T03:30:01.528297719Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-08T03:30:01.528297719Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-08T03:30:01.528297719Z Timeout: (time.Duration) 2m0s, 2026-03-08T03:30:01.528297719Z StaticPodManifestsLockFile: (string) "", 2026-03-08T03:30:01.528297719Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-08T03:30:01.528297719Z KubeletVersion: (string) "" 2026-03-08T03:30:01.528297719Z }) 2026-03-08T03:30:01.528297719Z I0308 03:25:17.454069 1 cmd.go:413] Getting controller reference for node master-0 2026-03-08T03:30:01.528297719Z I0308 03:25:17.463026 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-08T03:30:01.528297719Z I0308 03:25:17.463113 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-08T03:30:01.528297719Z I0308 03:25:17.463142 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-08T03:30:01.528297719Z I0308 03:25:17.465446 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-08T03:30:01.528297719Z I0308 03:25:47.465506 1 cmd.go:524] Getting installer pods for node master-0 2026-03-08T03:30:01.528297719Z F0308 03:26:01.467001 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T03:30:01.528297719Z W0308 03:30:01.527449 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-03-08T03:30:01.528297719Z W0308 03:30:01.527470 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-08T03:30:01.555091006Z I0308 03:30:01.555035 1 prune_controller.go:277] Nothing to prune 2026-03-08T03:30:08.538431662Z E0308 03:30:08.538325 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_kube-controller-manager reconciliation failed: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-03-08T03:30:08.540727871Z I0308 03:30:08.540623 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-08T03:11:07Z","message":"NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 2:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0308 03:25:17.454069 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0308 03:25:17.463026 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0308 03:25:17.463113 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0308 03:25:17.463142 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0308 03:25:17.465446 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0308 03:25:47.465506 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0308 03:26:01.467001 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-08T03:11:42Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-08T03:11:09Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-08T03:11:07Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-08T03:11:07Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-08T03:30:10.215506279Z E0308 03:30:10.215368 1 leaderelection.go:436] error retrieving resource lock openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager-operator/leases/kube-controller-manager-operator-lock?timeout=4m0s": context deadline exceeded 2026-03-08T03:30:10.215506279Z I0308 03:30:10.215430 1 leaderelection.go:297] failed to renew lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock: timed out waiting for the condition 2026-03-08T03:30:16.027035615Z I0308 03:30:16.021313 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-2-retry-1-master-0 -n openshift-kube-controller-manager because it was missing 2026-03-08T03:30:16.027035615Z I0308 03:30:16.026005 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-03-08T03:30:16.064785482Z I0308 03:30:16.064083 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-03-08T03:30:16.607487786Z I0308 03:30:16.607381 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-03-08T03:30:17.007301099Z I0308 03:30:17.007194 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-03-08T03:30:17.807016246Z I0308 03:30:17.806869 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-03-08T03:30:18.403411515Z I0308 03:30:18.403291 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-08T03:30:18.429925765Z E0308 03:30:18.425561 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-08T03:30:18.429989076Z I0308 03:30:18.426223 1 prune_controller.go:277] Nothing to prune 2026-03-08T03:30:18.441005559Z I0308 03:30:18.440892 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-08T03:30:18.441254015Z E0308 03:30:18.441198 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-08T03:30:18.807560260Z I0308 03:30:18.807463 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-03-08T03:30:19.608403977Z I0308 03:30:19.608292 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-03-08T03:30:27.136967383Z E0308 03:30:27.136871 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: \"manifests/installer-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)" 2026-03-08T03:30:27.139479067Z I0308 03:30:27.139430 1 prune_controller.go:277] Nothing to prune 2026-03-08T03:30:27.158091734Z W0308 03:30:27.157297 1 dynamic_operator_client.go:355] .status.conditions["BackingResourceControllerDegraded"].message is missing; this will eventually be fatal 2026-03-08T03:30:27.159550871Z I0308 03:30:27.159471 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-08T03:30:27.159619073Z E0308 03:30:27.159523 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-08T03:30:27.167408493Z I0308 03:30:27.167333 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-03-08T03:30:27.192629399Z I0308 03:30:27.191466 1 prune_controller.go:277] Nothing to prune 2026-03-08T03:30:27.543038806Z I0308 03:30:27.542949 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-08T03:30:27.543437586Z E0308 03:30:27.543390 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-08T03:30:27.624849292Z I0308 03:30:27.624740 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready" to "NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 2:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0308 03:25:17.454069 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0308 03:25:17.463026 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0308 03:25:17.463113 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0308 03:25:17.463142 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0308 03:25:17.465446 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0308 03:25:47.465506 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0308 03:26:01.467001 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" 2026-03-08T03:30:27.625058627Z I0308 03:30:27.624995 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-08T03:11:07Z","message":"NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 2:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0308 03:25:17.454069 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0308 03:25:17.463026 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0308 03:25:17.463113 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0308 03:25:17.463142 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0308 03:25:17.465446 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0308 03:25:47.465506 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0308 03:26:01.467001 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-08T03:11:42Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-08T03:11:09Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-08T03:11:07Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-08T03:11:07Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-08T03:30:27.668968032Z E0308 03:30:27.667006 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_kube-controller-manager reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"kube-controller-manager\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-08T03:30:27.673077017Z I0308 03:30:27.670401 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-08T03:11:07Z","message":"NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 2:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0308 03:25:17.454069 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0308 03:25:17.463026 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0308 03:25:17.463113 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0308 03:25:17.463142 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0308 03:25:17.465446 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0308 03:25:47.465506 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0308 03:26:01.467001 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-08T03:11:42Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-08T03:11:09Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-08T03:11:07Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-08T03:11:07Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-08T03:30:27.710999499Z I0308 03:30:27.708111 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"f2bb83eb-4159-48e2-8dd1-e9b0fee8176f", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 2:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0308 03:25:17.454069 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0308 03:25:17.463026 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0308 03:25:17.463113 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0308 03:25:17.463142 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0308 03:25:17.465446 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0308 03:25:47.465506 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0308 03:26:01.467001 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nSATokenSignerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" to "NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 2:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0308 03:25:17.454069 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0308 03:25:17.463026 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0308 03:25:17.463113 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0308 03:25:17.463142 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0308 03:25:17.465446 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0308 03:25:47.465506 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0308 03:26:01.467001 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: " 2026-03-08T03:30:27.751182518Z I0308 03:30:27.750553 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-03-08T03:30:32.631195529Z W0308 03:30:32.631127 1 leaderelection.go:84] leader election lost kube-controller-manager-operator-86d7cdfdfb-xtwpr.json0000640000000000000000000001451115153166561034034 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-86d7cdfdfb-xtwpr","generateName":"kube-controller-manager-operator-86d7cdfdfb-","namespace":"openshift-kube-controller-manager-operator","uid":"2468d2a3-ec65-4888-a86a-3f66fa311f56","resourceVersion":"12303","creationTimestamp":"2026-03-08T03:09:34Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"86d7cdfdfb"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.20/23\"],\"mac_address\":\"0a:58:0a:80:00:14\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.20/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.20\"\n ],\n \"mac\": \"0a:58:0a:80:00:14\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-86d7cdfdfb","uid":"098e6996-6e76-4eca-a285-b9daa74f0473","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:35768a0c3eb24134dd38633e8acfc7db69ee96b2fd660e9bba3b8c996452fef7"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:30:34Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:30:34Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.20","podIPs":[{"ip":"10.128.0.20"}],"startTime":"2026-03-08T03:10:53Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-03-08T03:30:34Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-08T03:19:02Z","finishedAt":"2026-03-08T03:30:32Z","containerID":"cri-o://f750a9def8422866b22d39a2cd3d196c793426a1bcfc147c9836ec1f7382a781"}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","containerID":"cri-o://6d872732014dac9194bf04c490a8845c7740960be98ce910cd2402378447a591","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-controller-manager/logs/installer-2-master-0/installer_current.log0000640000000000000000000001443515153166561031013 0ustar00000000000000002026-03-08T03:25:17.453055008Z I0308 03:25:17.451635 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc000a9b5e0 cert-dir:0xc000a9b7c0 cert-secrets:0xc000a9b540 configmaps:0xc000a9b0e0 namespace:0xc000a9af00 optional-cert-configmaps:0xc000a9b720 optional-configmaps:0xc000a9b220 optional-secrets:0xc000a9b180 pod:0xc000a9afa0 pod-manifest-dir:0xc000a9b360 resource-dir:0xc000a9b2c0 revision:0xc000a9ae60 secrets:0xc000a9b040 v:0xc000630fa0] [0xc000630fa0 0xc000a9ae60 0xc000a9af00 0xc000a9afa0 0xc000a9b2c0 0xc000a9b360 0xc000a9b0e0 0xc000a9b220 0xc000a9b040 0xc000a9b180 0xc000a9b7c0 0xc000a9b5e0 0xc000a9b720 0xc000a9b540] [] map[cert-configmaps:0xc000a9b5e0 cert-dir:0xc000a9b7c0 cert-secrets:0xc000a9b540 configmaps:0xc000a9b0e0 help:0xc000631360 kubeconfig:0xc000a9adc0 log-flush-frequency:0xc000630f00 namespace:0xc000a9af00 optional-cert-configmaps:0xc000a9b720 optional-cert-secrets:0xc000a9b680 optional-configmaps:0xc000a9b220 optional-secrets:0xc000a9b180 pod:0xc000a9afa0 pod-manifest-dir:0xc000a9b360 pod-manifests-lock-file:0xc000a9b4a0 resource-dir:0xc000a9b2c0 revision:0xc000a9ae60 secrets:0xc000a9b040 timeout-duration:0xc000a9b400 v:0xc000630fa0 vmodule:0xc000631040] [0xc000a9adc0 0xc000a9ae60 0xc000a9af00 0xc000a9afa0 0xc000a9b040 0xc000a9b0e0 0xc000a9b180 0xc000a9b220 0xc000a9b2c0 0xc000a9b360 0xc000a9b400 0xc000a9b4a0 0xc000a9b540 0xc000a9b5e0 0xc000a9b680 0xc000a9b720 0xc000a9b7c0 0xc000630f00 0xc000630fa0 0xc000631040 0xc000631360] [0xc000a9b5e0 0xc000a9b7c0 0xc000a9b540 0xc000a9b0e0 0xc000631360 0xc000a9adc0 0xc000630f00 0xc000a9af00 0xc000a9b720 0xc000a9b680 0xc000a9b220 0xc000a9b180 0xc000a9afa0 0xc000a9b360 0xc000a9b4a0 0xc000a9b2c0 0xc000a9ae60 0xc000a9b040 0xc000a9b400 0xc000630fa0 0xc000631040] map[104:0xc000631360 118:0xc000630fa0] [] -1 0 0xc0006799b0 true 0x77b900 []} 2026-03-08T03:25:17.453221722Z I0308 03:25:17.453060 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000054b60)({ 2026-03-08T03:25:17.453221722Z KubeConfig: (string) "", 2026-03-08T03:25:17.453221722Z KubeClient: (kubernetes.Interface) , 2026-03-08T03:25:17.453221722Z Revision: (string) (len=1) "2", 2026-03-08T03:25:17.453221722Z NodeName: (string) "", 2026-03-08T03:25:17.453221722Z Namespace: (string) (len=33) "openshift-kube-controller-manager", 2026-03-08T03:25:17.453221722Z Clock: (clock.RealClock) { 2026-03-08T03:25:17.453221722Z }, 2026-03-08T03:25:17.453221722Z PodConfigMapNamePrefix: (string) (len=27) "kube-controller-manager-pod", 2026-03-08T03:25:17.453221722Z SecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-08T03:25:17.453221722Z (string) (len=27) "service-account-private-key", 2026-03-08T03:25:17.453221722Z (string) (len=31) "localhost-recovery-client-token" 2026-03-08T03:25:17.453221722Z }, 2026-03-08T03:25:17.453221722Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T03:25:17.453221722Z (string) (len=12) "serving-cert" 2026-03-08T03:25:17.453221722Z }, 2026-03-08T03:25:17.453221722Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-08T03:25:17.453221722Z (string) (len=27) "kube-controller-manager-pod", 2026-03-08T03:25:17.453221722Z (string) (len=6) "config", 2026-03-08T03:25:17.453221722Z (string) (len=32) "cluster-policy-controller-config", 2026-03-08T03:25:17.453221722Z (string) (len=29) "controller-manager-kubeconfig", 2026-03-08T03:25:17.453221722Z (string) (len=38) "kube-controller-cert-syncer-kubeconfig", 2026-03-08T03:25:17.453221722Z (string) (len=17) "serviceaccount-ca", 2026-03-08T03:25:17.453221722Z (string) (len=10) "service-ca", 2026-03-08T03:25:17.453221722Z (string) (len=15) "recycler-config" 2026-03-08T03:25:17.453221722Z }, 2026-03-08T03:25:17.453221722Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T03:25:17.453221722Z (string) (len=12) "cloud-config" 2026-03-08T03:25:17.453221722Z }, 2026-03-08T03:25:17.453221722Z CertSecretNames: ([]string) (len=2 cap=2) { 2026-03-08T03:25:17.453221722Z (string) (len=39) "kube-controller-manager-client-cert-key", 2026-03-08T03:25:17.453221722Z (string) (len=10) "csr-signer" 2026-03-08T03:25:17.453221722Z }, 2026-03-08T03:25:17.453221722Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-08T03:25:17.453221722Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-08T03:25:17.453221722Z (string) (len=20) "aggregator-client-ca", 2026-03-08T03:25:17.453221722Z (string) (len=9) "client-ca" 2026-03-08T03:25:17.453221722Z }, 2026-03-08T03:25:17.453221722Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T03:25:17.453221722Z (string) (len=17) "trusted-ca-bundle" 2026-03-08T03:25:17.453221722Z }, 2026-03-08T03:25:17.453221722Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-08T03:25:17.453221722Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-08T03:25:17.453221722Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-08T03:25:17.453221722Z Timeout: (time.Duration) 2m0s, 2026-03-08T03:25:17.453221722Z StaticPodManifestsLockFile: (string) "", 2026-03-08T03:25:17.453221722Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-08T03:25:17.453221722Z KubeletVersion: (string) "" 2026-03-08T03:25:17.453221722Z }) 2026-03-08T03:25:17.454115115Z I0308 03:25:17.454069 1 cmd.go:413] Getting controller reference for node master-0 2026-03-08T03:25:17.463078009Z I0308 03:25:17.463026 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-08T03:25:17.463148511Z I0308 03:25:17.463113 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-08T03:25:17.463148511Z I0308 03:25:17.463142 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-08T03:25:17.465488162Z I0308 03:25:17.465446 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-08T03:25:47.465609671Z I0308 03:25:47.465506 1 cmd.go:524] Getting installer pods for node master-0 2026-03-08T03:26:01.467131205Z F0308 03:26:01.467001 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-controller-manager/logs/installer-1-master-0/installer_current.log0000640000000000000000000001443515153166561031012 0ustar00000000000000002026-03-08T03:11:48.464765699Z I0308 03:11:48.464559 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc0007bd220 cert-dir:0xc0007bd400 cert-secrets:0xc0007bd180 configmaps:0xc0007bcd20 namespace:0xc0007bcb40 optional-cert-configmaps:0xc0007bd360 optional-configmaps:0xc0007bce60 optional-secrets:0xc0007bcdc0 pod:0xc0007bcbe0 pod-manifest-dir:0xc0007bcfa0 resource-dir:0xc0007bcf00 revision:0xc0007bcaa0 secrets:0xc0007bcc80 v:0xc0007bde00] [0xc0007bde00 0xc0007bcaa0 0xc0007bcb40 0xc0007bcbe0 0xc0007bcf00 0xc0007bcfa0 0xc0007bcd20 0xc0007bce60 0xc0007bcc80 0xc0007bcdc0 0xc0007bd400 0xc0007bd220 0xc0007bd360 0xc0007bd180] [] map[cert-configmaps:0xc0007bd220 cert-dir:0xc0007bd400 cert-secrets:0xc0007bd180 configmaps:0xc0007bcd20 help:0xc00041ed20 kubeconfig:0xc0007bca00 log-flush-frequency:0xc0007bdd60 namespace:0xc0007bcb40 optional-cert-configmaps:0xc0007bd360 optional-cert-secrets:0xc0007bd2c0 optional-configmaps:0xc0007bce60 optional-secrets:0xc0007bcdc0 pod:0xc0007bcbe0 pod-manifest-dir:0xc0007bcfa0 pod-manifests-lock-file:0xc0007bd0e0 resource-dir:0xc0007bcf00 revision:0xc0007bcaa0 secrets:0xc0007bcc80 timeout-duration:0xc0007bd040 v:0xc0007bde00 vmodule:0xc0007bdea0] [0xc0007bca00 0xc0007bcaa0 0xc0007bcb40 0xc0007bcbe0 0xc0007bcc80 0xc0007bcd20 0xc0007bcdc0 0xc0007bce60 0xc0007bcf00 0xc0007bcfa0 0xc0007bd040 0xc0007bd0e0 0xc0007bd180 0xc0007bd220 0xc0007bd2c0 0xc0007bd360 0xc0007bd400 0xc0007bdd60 0xc0007bde00 0xc0007bdea0 0xc00041ed20] [0xc0007bd220 0xc0007bd400 0xc0007bd180 0xc0007bcd20 0xc00041ed20 0xc0007bca00 0xc0007bdd60 0xc0007bcb40 0xc0007bd360 0xc0007bd2c0 0xc0007bce60 0xc0007bcdc0 0xc0007bcbe0 0xc0007bcfa0 0xc0007bd0e0 0xc0007bcf00 0xc0007bcaa0 0xc0007bcc80 0xc0007bd040 0xc0007bde00 0xc0007bdea0] map[104:0xc00041ed20 118:0xc0007bde00] [] -1 0 0xc0006feae0 true 0x77b900 []} 2026-03-08T03:11:48.464883472Z I0308 03:11:48.464776 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000055860)({ 2026-03-08T03:11:48.464883472Z KubeConfig: (string) "", 2026-03-08T03:11:48.464883472Z KubeClient: (kubernetes.Interface) , 2026-03-08T03:11:48.464883472Z Revision: (string) (len=1) "1", 2026-03-08T03:11:48.464883472Z NodeName: (string) "", 2026-03-08T03:11:48.464883472Z Namespace: (string) (len=33) "openshift-kube-controller-manager", 2026-03-08T03:11:48.464883472Z Clock: (clock.RealClock) { 2026-03-08T03:11:48.464883472Z }, 2026-03-08T03:11:48.464883472Z PodConfigMapNamePrefix: (string) (len=27) "kube-controller-manager-pod", 2026-03-08T03:11:48.464883472Z SecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-08T03:11:48.464883472Z (string) (len=27) "service-account-private-key", 2026-03-08T03:11:48.464883472Z (string) (len=31) "localhost-recovery-client-token" 2026-03-08T03:11:48.464883472Z }, 2026-03-08T03:11:48.464883472Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T03:11:48.464883472Z (string) (len=12) "serving-cert" 2026-03-08T03:11:48.464883472Z }, 2026-03-08T03:11:48.464883472Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-08T03:11:48.464883472Z (string) (len=27) "kube-controller-manager-pod", 2026-03-08T03:11:48.464883472Z (string) (len=6) "config", 2026-03-08T03:11:48.464883472Z (string) (len=32) "cluster-policy-controller-config", 2026-03-08T03:11:48.464883472Z (string) (len=29) "controller-manager-kubeconfig", 2026-03-08T03:11:48.464883472Z (string) (len=38) "kube-controller-cert-syncer-kubeconfig", 2026-03-08T03:11:48.464883472Z (string) (len=17) "serviceaccount-ca", 2026-03-08T03:11:48.464883472Z (string) (len=10) "service-ca", 2026-03-08T03:11:48.464883472Z (string) (len=15) "recycler-config" 2026-03-08T03:11:48.464883472Z }, 2026-03-08T03:11:48.464883472Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T03:11:48.464883472Z (string) (len=12) "cloud-config" 2026-03-08T03:11:48.464883472Z }, 2026-03-08T03:11:48.464883472Z CertSecretNames: ([]string) (len=2 cap=2) { 2026-03-08T03:11:48.464883472Z (string) (len=39) "kube-controller-manager-client-cert-key", 2026-03-08T03:11:48.464883472Z (string) (len=10) "csr-signer" 2026-03-08T03:11:48.464883472Z }, 2026-03-08T03:11:48.464883472Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-08T03:11:48.464883472Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-08T03:11:48.464883472Z (string) (len=20) "aggregator-client-ca", 2026-03-08T03:11:48.464883472Z (string) (len=9) "client-ca" 2026-03-08T03:11:48.464883472Z }, 2026-03-08T03:11:48.464883472Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T03:11:48.464883472Z (string) (len=17) "trusted-ca-bundle" 2026-03-08T03:11:48.464883472Z }, 2026-03-08T03:11:48.464883472Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-08T03:11:48.464883472Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-08T03:11:48.464883472Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-08T03:11:48.464883472Z Timeout: (time.Duration) 2m0s, 2026-03-08T03:11:48.464883472Z StaticPodManifestsLockFile: (string) "", 2026-03-08T03:11:48.464883472Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-08T03:11:48.464883472Z KubeletVersion: (string) "" 2026-03-08T03:11:48.464883472Z }) 2026-03-08T03:11:48.465759985Z I0308 03:11:48.465727 1 cmd.go:413] Getting controller reference for node master-0 2026-03-08T03:11:48.550957548Z I0308 03:11:48.549996 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-08T03:11:48.550957548Z I0308 03:11:48.550040 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-08T03:11:48.550957548Z I0308 03:11:48.550048 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-08T03:11:48.555961950Z I0308 03:11:48.553287 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-08T03:12:18.553604211Z I0308 03:12:18.553489 1 cmd.go:524] Getting installer pods for node master-0 2026-03-08T03:12:32.557641184Z F0308 03:12:32.557472 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-controller-manager/installer-1-master-0.json0000640000000000000000000001716115153166561024476 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-controller-manager","uid":"0a8d4b89-fd81-4418-9f72-c8447fad86ad","resourceVersion":"8324","creationTimestamp":"2026-03-08T03:11:45Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.44/23\"],\"mac_address\":\"0a:58:0a:80:00:2c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.44/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.44\"\n ],\n \"mac\": \"0a:58:0a:80:00:2c\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"57d2271e-dcd1-45cc-ba21-1ebb72d4099a"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["cluster-kube-controller-manager-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-controller-manager","--pod=kube-controller-manager-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-controller-manager-pod","--configmaps=config","--configmaps=cluster-policy-controller-config","--configmaps=controller-manager-kubeconfig","--optional-configmaps=cloud-config","--configmaps=kube-controller-cert-syncer-kubeconfig","--configmaps=serviceaccount-ca","--configmaps=service-ca","--configmaps=recycler-config","--secrets=service-account-private-key","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-controller-manager-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-secrets=kube-controller-manager-client-cert-key","--cert-secrets=csr-signer"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:13:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:45Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:13:39Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:13:39Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:45Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.44","podIPs":[{"ip":"10.128.0.44"}],"startTime":"2026-03-08T03:11:45Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"icy-controller-config\",\n (string) (len=29) \"controller-manager-kubeconfig\",\n (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=10) \"service-ca\",\n (string) (len=15) \"recycler-config\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=12) \"cloud-config\"\n },\n CertSecretNames: ([]string) (len=2 cap=2) {\n (string) (len=39) \"kube-controller-manager-client-cert-key\",\n (string) (len=10) \"csr-signer\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0308 03:11:48.465727 1 cmd.go:413] Getting controller reference for node master-0\nI0308 03:11:48.549996 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0308 03:11:48.550040 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0308 03:11:48.550048 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0308 03:11:48.553287 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0308 03:12:18.553489 1 cmd.go:524] Getting installer pods for node master-0\nF0308 03:12:32.557472 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-08T03:11:47Z","finishedAt":"2026-03-08T03:12:32Z","containerID":"cri-o://0cb275b613648ba82dd895945a8f72c136f919a1708eb582688a065e13a9ce66"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","containerID":"cri-o://0cb275b613648ba82dd895945a8f72c136f919a1708eb582688a065e13a9ce66","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/openshift-oauth-apiserver/logs/apiserver-7b545788fb-82rjl/oauth-apiserver_current.log0000640000000000000000000011713615153166561031235 0ustar00000000000000002026-03-08T03:28:39.945967235Z E0308 03:28:39.945941 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:39.946034396Z E0308 03:28:39.946000 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:41.055154203Z W0308 03:28:41.055032 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-08T03:28:56.980998187Z E0308 03:28:56.980837 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:56.981406418Z E0308 03:28:56.981354 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:56.985019530Z E0308 03:28:56.984944 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:56.985640406Z E0308 03:28:56.985580 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:56.985898503Z E0308 03:28:56.985828 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:56.986090748Z E0308 03:28:56.986009 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:56.986313583Z E0308 03:28:56.986252 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:56.986343084Z E0308 03:28:56.986312 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:56.986585380Z E0308 03:28:56.986530 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:28:56.986839537Z E0308 03:28:56.986795 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.903254236Z E0308 03:29:09.903198 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.903761499Z E0308 03:29:09.903724 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.904068207Z E0308 03:29:09.904045 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.904207420Z E0308 03:29:09.904174 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.904346324Z E0308 03:29:09.904304 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.904452347Z E0308 03:29:09.904435 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.904574560Z E0308 03:29:09.904538 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.904780745Z E0308 03:29:09.904755 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.904897668Z E0308 03:29:09.904861 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.905083623Z E0308 03:29:09.904811 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.918643230Z E0308 03:29:09.918611 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.934485255Z E0308 03:29:09.934443 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.952448585Z E0308 03:29:09.951616 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.952448585Z E0308 03:29:09.952255 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.952682661Z E0308 03:29:09.952648 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.952756422Z E0308 03:29:09.952737 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.953034040Z E0308 03:29:09.952740 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.953216144Z E0308 03:29:09.953184 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:09.971040030Z E0308 03:29:09.970999 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:10.058661732Z E0308 03:29:10.058624 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:10.058866377Z E0308 03:29:10.058674 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:10.067472997Z E0308 03:29:10.067450 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:10.067735434Z E0308 03:29:10.067684 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:26.990833230Z E0308 03:29:26.990722 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:26.990833230Z E0308 03:29:26.990759 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:26.991188019Z E0308 03:29:26.991107 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:26.991328183Z E0308 03:29:26.991241 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:26.991432156Z E0308 03:29:26.991107 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:27.000739504Z E0308 03:29:27.000640 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:27.000739504Z E0308 03:29:27.000693 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:27.000950169Z E0308 03:29:27.000792 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:27.000950169Z E0308 03:29:27.000807 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:27.000989450Z E0308 03:29:27.000945 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:39.922602791Z E0308 03:29:39.922350 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:39.922602791Z E0308 03:29:39.922555 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:39.924831808Z E0308 03:29:39.922657 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:39.924831808Z E0308 03:29:39.922723 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:39.924831808Z E0308 03:29:39.922735 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:39.949693665Z E0308 03:29:39.949620 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:39.950126896Z E0308 03:29:39.950070 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:39.950361192Z E0308 03:29:39.950254 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:39.951404189Z E0308 03:29:39.950405 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:39.951404189Z E0308 03:29:39.950523 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:57.002986745Z E0308 03:29:57.002836 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:57.003488468Z E0308 03:29:57.003407 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:57.003650172Z E0308 03:29:57.003572 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:57.004099273Z E0308 03:29:57.004037 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:57.004160975Z E0308 03:29:57.004086 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:57.006593397Z E0308 03:29:57.006515 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:57.006678519Z E0308 03:29:57.006551 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:57.006678519Z E0308 03:29:57.006599 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:57.007023338Z E0308 03:29:57.006943 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:29:57.007254364Z E0308 03:29:57.006946 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:09.910518735Z E0308 03:30:09.910409 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:09.910743521Z E0308 03:30:09.910685 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:09.911112910Z E0308 03:30:09.911065 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:09.911252694Z E0308 03:30:09.911211 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:09.911465669Z E0308 03:30:09.911431 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:09.939272032Z E0308 03:30:09.939163 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:09.939538859Z E0308 03:30:09.939502 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:09.939658522Z E0308 03:30:09.939621 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:09.939882077Z E0308 03:30:09.939843 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:09.939949369Z E0308 03:30:09.939896 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:10.002584724Z E0308 03:30:10.002532 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:10.002772549Z E0308 03:30:10.002531 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:10.010838685Z E0308 03:30:10.010765 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:10.011026320Z E0308 03:30:10.010765 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:27.025044105Z E0308 03:30:27.024112 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:27.025044105Z E0308 03:30:27.024211 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:27.025044105Z E0308 03:30:27.024239 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:27.025044105Z E0308 03:30:27.024562 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:27.025044105Z E0308 03:30:27.024727 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:27.025044105Z E0308 03:30:27.024802 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:27.025044105Z E0308 03:30:27.025012 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:27.025178149Z E0308 03:30:27.025128 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:27.026111673Z E0308 03:30:27.025228 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:27.026111673Z E0308 03:30:27.025501 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.921502423Z E0308 03:30:39.917967 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.921502423Z E0308 03:30:39.918023 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.921502423Z E0308 03:30:39.918060 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.921502423Z E0308 03:30:39.918081 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.921502423Z E0308 03:30:39.918132 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.921502423Z E0308 03:30:39.918299 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.921502423Z E0308 03:30:39.917966 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.921502423Z E0308 03:30:39.918366 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.921502423Z E0308 03:30:39.918379 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" 2026-03-08T03:30:39.921502423Z E0308 03:30:39.918474 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4239591398452817756, SKID=C5:E0:D9:D4:F4:73:7F:71:A9:BF:27:84:4E:C3:30:7F:82:FA:28:68, AKID=DD:05:F0:6F:A3:37:70:EB:D5:23:54:C7:16:56:53:21:B2:10:17:4F failed: x509: certificate signed by unknown authority]" config/pod/openshift-ingress/logs/router-default-79f8cd6fdd-tkxj9/router_current.log0000640000000000000000000002240215153166561027257 0ustar00000000000000002026-03-08T03:30:17.598800523Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:17.598800523Z [-]has-synced failed: Router not synced 2026-03-08T03:30:18.599567561Z I0308 03:30:18.599456 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:18.599567561Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:18.599567561Z [-]has-synced failed: Router not synced 2026-03-08T03:30:19.599561150Z I0308 03:30:19.599422 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:19.599561150Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:19.599561150Z [-]has-synced failed: Router not synced 2026-03-08T03:30:19.841056787Z W0308 03:30:19.840899 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-08T03:30:19.841056787Z E0308 03:30:19.841017 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-08T03:30:20.599476727Z I0308 03:30:20.599380 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:20.599476727Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:20.599476727Z [-]has-synced failed: Router not synced 2026-03-08T03:30:21.600987165Z I0308 03:30:21.599578 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:21.600987165Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:21.600987165Z [-]has-synced failed: Router not synced 2026-03-08T03:30:22.599086035Z I0308 03:30:22.599007 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:22.599086035Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:22.599086035Z [-]has-synced failed: Router not synced 2026-03-08T03:30:23.600159652Z I0308 03:30:23.600097 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:23.600159652Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:23.600159652Z [-]has-synced failed: Router not synced 2026-03-08T03:30:24.599071544Z I0308 03:30:24.599009 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:24.599071544Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:24.599071544Z [-]has-synced failed: Router not synced 2026-03-08T03:30:25.598686563Z I0308 03:30:25.598612 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:25.598686563Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:25.598686563Z [-]has-synced failed: Router not synced 2026-03-08T03:30:26.600552280Z I0308 03:30:26.600475 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:26.600552280Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:26.600552280Z [-]has-synced failed: Router not synced 2026-03-08T03:30:27.599299547Z I0308 03:30:27.599234 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:27.599299547Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:27.599299547Z [-]has-synced failed: Router not synced 2026-03-08T03:30:28.599300856Z I0308 03:30:28.599225 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:28.599300856Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:28.599300856Z [-]has-synced failed: Router not synced 2026-03-08T03:30:29.599736306Z I0308 03:30:29.599615 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:29.599736306Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:29.599736306Z [-]has-synced failed: Router not synced 2026-03-08T03:30:30.599190672Z I0308 03:30:30.599077 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:30.599190672Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:30.599190672Z [-]has-synced failed: Router not synced 2026-03-08T03:30:31.599599922Z I0308 03:30:31.599505 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:31.599599922Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:31.599599922Z [-]has-synced failed: Router not synced 2026-03-08T03:30:32.598725007Z I0308 03:30:32.598652 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:32.598725007Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:32.598725007Z [-]has-synced failed: Router not synced 2026-03-08T03:30:33.599538058Z I0308 03:30:33.599352 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:33.599538058Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:33.599538058Z [-]has-synced failed: Router not synced 2026-03-08T03:30:34.599534187Z I0308 03:30:34.599448 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:34.599534187Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:34.599534187Z [-]has-synced failed: Router not synced 2026-03-08T03:30:35.599825733Z I0308 03:30:35.599728 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:35.599825733Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:35.599825733Z [-]has-synced failed: Router not synced 2026-03-08T03:30:36.598124629Z I0308 03:30:36.597917 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:36.598124629Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:36.598124629Z [-]has-synced failed: Router not synced 2026-03-08T03:30:37.598481134Z I0308 03:30:37.598407 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:37.598481134Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:37.598481134Z [-]has-synced failed: Router not synced 2026-03-08T03:30:38.599246210Z I0308 03:30:38.599154 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:38.599246210Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:38.599246210Z [-]has-synced failed: Router not synced 2026-03-08T03:30:39.597945873Z I0308 03:30:39.597874 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:39.597945873Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:39.597945873Z [-]has-synced failed: Router not synced 2026-03-08T03:30:40.599381255Z I0308 03:30:40.599294 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:40.599381255Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:40.599381255Z [-]has-synced failed: Router not synced 2026-03-08T03:30:41.598984982Z I0308 03:30:41.598868 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:41.598984982Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:41.598984982Z [-]has-synced failed: Router not synced 2026-03-08T03:30:42.598452745Z I0308 03:30:42.598331 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:42.598452745Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:42.598452745Z [-]has-synced failed: Router not synced 2026-03-08T03:30:43.599140008Z I0308 03:30:43.599039 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:43.599140008Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:43.599140008Z [-]has-synced failed: Router not synced 2026-03-08T03:30:44.598525519Z I0308 03:30:44.598463 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:44.598525519Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:44.598525519Z [-]has-synced failed: Router not synced 2026-03-08T03:30:45.599266764Z I0308 03:30:45.599176 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:45.599266764Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:45.599266764Z [-]has-synced failed: Router not synced 2026-03-08T03:30:46.602357807Z I0308 03:30:46.602235 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:46.602357807Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:46.602357807Z [-]has-synced failed: Router not synced 2026-03-08T03:30:47.599396289Z I0308 03:30:47.599286 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:47.599396289Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:47.599396289Z [-]has-synced failed: Router not synced 2026-03-08T03:30:48.598273397Z I0308 03:30:48.598129 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:48.598273397Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:48.598273397Z [-]has-synced failed: Router not synced 2026-03-08T03:30:49.598675484Z I0308 03:30:49.598548 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T03:30:49.598675484Z [-]backend-http failed: backend reported failure 2026-03-08T03:30:49.598675484Z [-]has-synced failed: Router not synced authentication-operator_current.log0000640000000000000000000003062315153166561037401 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-7c6989d6c4-k8xgg2026-03-08T03:30:20.933168446Z Copying system trust bundle 2026-03-08T03:30:21.021517610Z W0308 03:30:21.021394 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-03-08T03:30:21.022016183Z I0308 03:30:21.021939 1 observer_polling.go:159] Starting file observer 2026-03-08T03:30:21.022597407Z I0308 03:30:21.022542 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-08T03:30:21.022680240Z I0308 03:30:21.022598 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-08T03:30:21.023286165Z I0308 03:30:21.023187 1 observer_polling.go:159] Starting file observer 2026-03-08T03:30:36.356304554Z I0308 03:30:36.356196 1 builder.go:304] cluster-authentication-operator version - 2026-03-08T03:30:36.364823262Z I0308 03:30:36.361407 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-08T03:30:36.937747670Z I0308 03:30:36.937293 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-08T03:30:36.947118980Z I0308 03:30:36.943320 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-08T03:30:36.947118980Z I0308 03:30:36.943342 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-08T03:30:36.947118980Z I0308 03:30:36.943366 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-08T03:30:36.947118980Z I0308 03:30:36.943371 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-08T03:30:36.953008461Z I0308 03:30:36.948685 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-08T03:30:36.953008461Z W0308 03:30:36.948707 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T03:30:36.953008461Z W0308 03:30:36.948712 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T03:30:36.953008461Z W0308 03:30:36.948716 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-08T03:30:36.953008461Z W0308 03:30:36.948720 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-08T03:30:36.953008461Z W0308 03:30:36.948722 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-08T03:30:36.953008461Z W0308 03:30:36.948725 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-08T03:30:36.953008461Z I0308 03:30:36.948890 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-08T03:30:36.957853255Z I0308 03:30:36.956204 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-08T03:30:36.957853255Z I0308 03:30:36.956253 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-08T03:30:36.957853255Z I0308 03:30:36.956296 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T03:30:36.957853255Z I0308 03:30:36.956313 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T03:30:36.957853255Z I0308 03:30:36.956329 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T03:30:36.957853255Z I0308 03:30:36.956336 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T03:30:36.957853255Z I0308 03:30:36.956515 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-08T03:30:36.957853255Z I0308 03:30:36.956524 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-08T03:30:36.961699124Z I0308 03:30:36.959732 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-08T03:30:36.961699124Z I0308 03:30:36.960036 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-08T03:30:36.961699124Z I0308 03:30:36.960065 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... 2026-03-08T03:30:36.961699124Z I0308 03:30:36.960314 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-08T03:30:36.961699124Z I0308 03:30:36.960436 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-03-08T03:30:36.967659136Z I0308 03:30:36.967194 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1772939468\" (2026-03-08 03:11:11 +0000 UTC to 2028-03-07 03:11:12 +0000 UTC (now=2026-03-08 03:30:36.967162214 +0000 UTC))" 2026-03-08T03:30:36.967659136Z I0308 03:30:36.967320 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1772940636\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1772940636\" (2026-03-08 02:30:36 +0000 UTC to 2027-03-08 02:30:36 +0000 UTC (now=2026-03-08 03:30:36.967303097 +0000 UTC))" 2026-03-08T03:30:36.967659136Z I0308 03:30:36.967535 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-08T03:30:36.967659136Z I0308 03:30:36.967556 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-08T03:30:36.967659136Z I0308 03:30:36.967577 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-08T03:30:36.968852837Z I0308 03:30:36.967722 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-08T03:30:37.058824412Z I0308 03:30:37.058776 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T03:30:37.058847893Z I0308 03:30:37.058821 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-08T03:30:37.058931555Z I0308 03:30:37.058896 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T03:30:37.059164441Z I0308 03:30:37.059074 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-08 03:01:07 +0000 UTC to 2026-03-09 03:01:07 +0000 UTC (now=2026-03-08 03:30:37.059045578 +0000 UTC))" 2026-03-08T03:30:37.059247123Z I0308 03:30:37.059219 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1772939468\" (2026-03-08 03:11:11 +0000 UTC to 2028-03-07 03:11:12 +0000 UTC (now=2026-03-08 03:30:37.059205962 +0000 UTC))" 2026-03-08T03:30:37.059337735Z I0308 03:30:37.059313 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1772940636\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1772940636\" (2026-03-08 02:30:36 +0000 UTC to 2027-03-08 02:30:36 +0000 UTC (now=2026-03-08 03:30:37.059302524 +0000 UTC))" 2026-03-08T03:30:37.059519200Z I0308 03:30:37.059490 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-08 02:54:35 +0000 UTC to 2036-03-05 02:54:35 +0000 UTC (now=2026-03-08 03:30:37.059477929 +0000 UTC))" 2026-03-08T03:30:37.059519200Z I0308 03:30:37.059508 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-08 03:01:08 +0000 UTC to 2026-03-09 03:01:08 +0000 UTC (now=2026-03-08 03:30:37.059499879 +0000 UTC))" 2026-03-08T03:30:37.059536020Z I0308 03:30:37.059519 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-08 03:01:08 +0000 UTC to 2027-03-08 03:01:08 +0000 UTC (now=2026-03-08 03:30:37.05951231 +0000 UTC))" 2026-03-08T03:30:37.059536020Z I0308 03:30:37.059531 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-08 03:01:09 +0000 UTC to 2027-03-08 03:01:09 +0000 UTC (now=2026-03-08 03:30:37.05952356 +0000 UTC))" 2026-03-08T03:30:37.059577371Z I0308 03:30:37.059543 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-08 03:01:06 +0000 UTC to 2036-03-05 03:01:06 +0000 UTC (now=2026-03-08 03:30:37.05953525 +0000 UTC))" 2026-03-08T03:30:37.059577371Z I0308 03:30:37.059559 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-08 03:01:07 +0000 UTC to 2026-03-09 03:01:07 +0000 UTC (now=2026-03-08 03:30:37.059550691 +0000 UTC))" 2026-03-08T03:30:37.059670064Z I0308 03:30:37.059651 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1772939468\" (2026-03-08 03:11:11 +0000 UTC to 2028-03-07 03:11:12 +0000 UTC (now=2026-03-08 03:30:37.059639433 +0000 UTC))" 2026-03-08T03:30:37.059757746Z I0308 03:30:37.059739 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1772940636\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1772940636\" (2026-03-08 02:30:36 +0000 UTC to 2027-03-08 02:30:36 +0000 UTC (now=2026-03-08 03:30:37.059729635 +0000 UTC))" authentication-operator_previous.log0000640000000000000000000006255715153166561037606 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-7c6989d6c4-k8xgg2026-03-08T03:25:09.510531229Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401 2026-03-08T03:25:09.510531229Z > 2026-03-08T03:25:10.567001285Z E0308 03:25:10.565667 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:25:10.567001285Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401 2026-03-08T03:25:10.567001285Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401 2026-03-08T03:25:10.567001285Z > 2026-03-08T03:25:10.577223882Z E0308 03:25:10.577069 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:25:10.577223882Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401 2026-03-08T03:25:10.577223882Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401 2026-03-08T03:25:10.577223882Z > 2026-03-08T03:25:10.612852822Z E0308 03:25:10.612765 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:25:10.612852822Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401 2026-03-08T03:25:10.612852822Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401 2026-03-08T03:25:10.612852822Z > 2026-03-08T03:25:19.507375801Z E0308 03:25:19.507326 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:25:19.507375801Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401 2026-03-08T03:25:19.507375801Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401 2026-03-08T03:25:19.507375801Z > 2026-03-08T03:25:23.143346019Z E0308 03:25:23.143272 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-08T03:25:29.510748384Z E0308 03:25:29.510634 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T03:25:29.510748384Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401 2026-03-08T03:25:29.510748384Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401 2026-03-08T03:25:29.510748384Z > 2026-03-08T03:25:37.246560088Z W0308 03:25:37.246516 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-08T03:25:37.246649440Z E0308 03:25:37.246637 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-03-08T03:25:40.300750800Z E0308 03:25:40.300650 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.230.117:443/healthz\": dial tcp 172.30.230.117:443: connect: connection refused" 2026-03-08T03:25:41.202739474Z E0308 03:25:41.202636 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-08T03:25:46.880327533Z W0308 03:25:46.880193 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-03-08T03:25:46.880327533Z E0308 03:25:46.880262 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-03-08T03:25:50.044766303Z E0308 03:25:50.044658 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.230.117:443/healthz\": dial tcp 172.30.230.117:443: connect: connection refused" 2026-03-08T03:26:12.718801731Z W0308 03:26:12.718690 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-08T03:26:12.718801731Z E0308 03:26:12.718755 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-03-08T03:26:20.018277859Z E0308 03:26:20.018198 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-08T03:26:30.561790705Z W0308 03:26:30.561699 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-03-08T03:26:30.561790705Z E0308 03:26:30.561765 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-03-08T03:26:38.941504772Z E0308 03:26:38.941363 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps oauth-serving-cert)" 2026-03-08T03:26:46.897046480Z E0308 03:26:46.896895 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)" 2026-03-08T03:26:51.316032625Z E0308 03:26:51.315963 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.230.117:443/healthz\": dial tcp 172.30.230.117:443: connect: connection refused" 2026-03-08T03:26:52.673166670Z W0308 03:26:52.673107 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal 2026-03-08T03:26:52.673293093Z W0308 03:26:52.673270 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal 2026-03-08T03:26:57.787614123Z E0308 03:26:57.787500 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-08T03:26:59.255291559Z W0308 03:26:59.255237 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-08T03:26:59.255442073Z E0308 03:26:59.255412 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-03-08T03:27:06.731589115Z E0308 03:27:06.731512 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get endpoints oauth-openshift)" 2026-03-08T03:27:11.959798677Z W0308 03:27:11.959706 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-03-08T03:27:11.959798677Z E0308 03:27:11.959769 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-03-08T03:27:13.134388796Z E0308 03:27:13.134323 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-03-08T03:27:17.270568494Z W0308 03:27:17.270505 1 base_controller.go:242] Updating status of "WebhookAuthenticatorController" failed: unable to ApplyStatus for operator using fieldManager "WebhookAuthenticatorController-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T03:27:17.270612375Z E0308 03:27:17.270563 1 base_controller.go:279] "Unhandled Error" err="WebhookAuthenticatorController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)" 2026-03-08T03:27:20.019561717Z E0308 03:27:20.019457 1 leaderelection.go:436] error retrieving resource lock openshift-authentication-operator/cluster-authentication-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-authentication-operator-lock) 2026-03-08T03:27:26.675998333Z E0308 03:27:26.675897 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-03-08T03:27:38.950454613Z E0308 03:27:38.950327 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps oauth-serving-cert)" 2026-03-08T03:27:39.508971960Z W0308 03:27:39.508836 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal 2026-03-08T03:27:39.508971960Z W0308 03:27:39.508880 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal 2026-03-08T03:27:45.854146664Z W0308 03:27:45.854046 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-08T03:27:45.854146664Z E0308 03:27:45.854124 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-03-08T03:27:46.900372919Z E0308 03:27:46.900295 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)" 2026-03-08T03:27:52.584315820Z E0308 03:27:52.584199 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.230.117:443/healthz\": dial tcp 172.30.230.117:443: connect: connection refused" 2026-03-08T03:28:06.740249427Z E0308 03:28:06.740134 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get endpoints oauth-openshift)" 2026-03-08T03:28:09.441662810Z W0308 03:28:09.441547 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-03-08T03:28:09.441662810Z E0308 03:28:09.441632 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-03-08T03:28:13.513126549Z E0308 03:28:13.513027 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-03-08T03:28:21.747493976Z W0308 03:28:21.747375 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-08T03:28:21.747493976Z E0308 03:28:21.747456 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-03-08T03:28:26.682020254Z W0308 03:28:26.681870 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal 2026-03-08T03:28:26.682020254Z W0308 03:28:26.681941 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal 2026-03-08T03:28:32.431715354Z E0308 03:28:32.431584 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-08T03:28:38.954940389Z E0308 03:28:38.954787 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps oauth-serving-cert)" 2026-03-08T03:28:46.903843758Z E0308 03:28:46.903719 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)" 2026-03-08T03:28:47.143516380Z E0308 03:28:47.143420 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-03-08T03:28:49.429317782Z W0308 03:28:49.429225 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-03-08T03:28:49.429317782Z E0308 03:28:49.429300 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-03-08T03:28:50.894791985Z W0308 03:28:50.894710 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T03:28:50.894791985Z E0308 03:28:50.894771 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets router-certs)" 2026-03-08T03:28:51.283565902Z W0308 03:28:51.283434 1 base_controller.go:242] Updating status of "WebhookAuthenticatorController" failed: unable to ApplyStatus for operator using fieldManager "WebhookAuthenticatorController-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T03:28:51.283565902Z E0308 03:28:51.283491 1 base_controller.go:279] "Unhandled Error" err="WebhookAuthenticatorController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)" 2026-03-08T03:28:53.859157767Z E0308 03:28:53.858962 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.230.117:443/healthz\": dial tcp 172.30.230.117:443: connect: connection refused" 2026-03-08T03:28:54.024660571Z E0308 03:28:54.024524 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-08T03:28:55.358996289Z W0308 03:28:55.358829 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-08T03:28:55.358996289Z E0308 03:28:55.358966 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-03-08T03:29:00.684985843Z E0308 03:29:00.684872 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-03-08T03:29:06.743789516Z E0308 03:29:06.743662 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get endpoints oauth-openshift)" 2026-03-08T03:29:37.050949531Z W0308 03:29:37.050818 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-03-08T03:29:37.050949531Z E0308 03:29:37.050888 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-03-08T03:29:38.958955592Z E0308 03:29:38.958856 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps oauth-serving-cert)" 2026-03-08T03:29:46.015900986Z E0308 03:29:46.015780 1 leaderelection.go:436] error retrieving resource lock openshift-authentication-operator/cluster-authentication-operator-lock: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock?timeout=4m0s": context deadline exceeded 2026-03-08T03:29:46.015900986Z I0308 03:29:46.015845 1 leaderelection.go:297] failed to renew lease openshift-authentication-operator/cluster-authentication-operator-lock: timed out waiting for the condition 2026-03-08T03:29:46.295750736Z E0308 03:29:46.295651 1 base_controller.go:279] "Unhandled Error" err="OpenShiftAuthenticatorCertRequester reconciliation failed: unable to get secret \"openshift-oauth-apiserver/openshift-authenticator-certs\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets openshift-authenticator-certs)" 2026-03-08T03:29:46.907250422Z E0308 03:29:46.907153 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)" 2026-03-08T03:29:54.368278666Z W0308 03:29:54.368143 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-08T03:29:54.368278666Z E0308 03:29:54.368218 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-03-08T03:29:55.129497078Z E0308 03:29:55.129396 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.230.117:443/healthz\": dial tcp 172.30.230.117:443: connect: connection refused" 2026-03-08T03:30:00.690988518Z W0308 03:30:00.689965 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal 2026-03-08T03:30:00.690988518Z W0308 03:30:00.689989 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal 2026-03-08T03:30:05.866518861Z W0308 03:30:05.866343 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal 2026-03-08T03:30:05.866518861Z W0308 03:30:05.866378 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal 2026-03-08T03:30:06.747564683Z E0308 03:30:06.747460 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get endpoints oauth-openshift)" 2026-03-08T03:30:07.077482624Z E0308 03:30:07.077365 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-08T03:30:20.019745975Z E0308 03:30:20.019566 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T03:30:20.019900859Z W0308 03:30:20.019868 1 leaderelection.go:84] leader election lost config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-k8xgg.json0000640000000000000000000002116715153166561030275 0ustar0000000000000000{"metadata":{"name":"authentication-operator-7c6989d6c4-k8xgg","generateName":"authentication-operator-7c6989d6c4-","namespace":"openshift-authentication-operator","uid":"90ef7c0a-7c6f-45aa-865d-1e247110b265","resourceVersion":"8366","creationTimestamp":"2026-03-08T03:09:33Z","labels":{"app":"authentication-operator","pod-template-hash":"7c6989d6c4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.7/23\"],\"mac_address\":\"0a:58:0a:80:00:07\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.7/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.7\"\n ],\n \"mac\": \"0a:58:0a:80:00:07\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-7c6989d6c4","uid":"1e2cfa01-4426-4ada-b972-01e8b6ec2a07","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-ttqvt","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3d3571ade02a7c61123d62c53fda6a57031a52c058c0571759dc09f96b23978f"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.34_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-ttqvt","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c5"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:18:11Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:18:11Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.7","podIPs":[{"ip":"10.128.0.7"}],"startTime":"2026-03-08T03:10:53Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-03-08T03:18:35Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"Copying system trust bundle\nW0308 03:17:04.755272 1 cmd.go:167] Unable to read initial content of \"/tmp/terminate\": open /tmp/terminate: no such file or directory\nI0308 03:17:04.755502 1 observer_polling.go:159] Starting file observer\nI0308 03:17:04.757291 1 cmd.go:253] Using service-serving-cert provided certificates\nI0308 03:17:04.757337 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0308 03:17:04.757674 1 observer_polling.go:159] Starting file observer\nW0308 03:18:04.764538 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods authentication-operator-7c6989d6c4-k8xgg)\nI0308 03:18:04.764695 1 builder.go:304] cluster-authentication-operator version -\nI0308 03:18:04.765550 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nI0308 03:18:35.012531 1 cmd.go:141] Received SIGTERM or SIGINT signal, shutting down controller.\nF0308 03:18:35.012801 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock\": context canceled\n","startedAt":"2026-03-08T03:17:04Z","finishedAt":"2026-03-08T03:18:35Z","containerID":"cri-o://dd4d219059033c12e8a9f8e3d34a3c3099d9ccfe2b147440dd167716ec750fdc"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","containerID":"cri-o://5c0ec338f20c1d3f7f3579ad9e29304940d141e2ae52320c796bdc9c2392d2b5","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-ttqvt","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000003161115153166561020647 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:06:00Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:06:10Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-854648ff6d to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:06:12Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-d64cfc9db to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:06:13Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-7d9c49f57b to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:06:13Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-854648ff6d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:06:14Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-d64cfc9db-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:06:14Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-7d9c49f57b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:09:26Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:09:32Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-d64cfc9db-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:09:32Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-7d9c49f57b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:09:32Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-854648ff6d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:09:34Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-7d9c49f57b-wsswx","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:09:35Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-d64cfc9db-t659n","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:09:35Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-854648ff6d-8qznw","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:01Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:01Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:01Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.24/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.23/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.26/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:37Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:37Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:47Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 9.857s (9.857s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:47Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:47Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:47Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:47Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:47Z","reason":"LeaderElection","message":"package-server-manager-854648ff6d-8qznw_a9fbc2f2-f9b2-4fe1-9ecb-40c88426c749 became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:47Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:47Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 9.584s (9.584s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:47Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:47Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 9.643s (9.643s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:48Z","reason":"RequirementsUnknown","message":"requirements not yet checked","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:49Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-7fcc847fc6 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:49Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-7fcc847fc6-s2lnw","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:50Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:50Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:50Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.47/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:11:50Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:17:46Z","reason":"ProbeError","message":"Liveness probe error: Get \"http://10.128.0.26:8080/healthz\": dial tcp 10.128.0.26:8080: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:17:46Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"http://10.128.0.26:8080/healthz\": dial tcp 10.128.0.26:8080: connect: connection refused","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:17:46Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"http://10.128.0.26:8080/healthz\": dial tcp 10.128.0.26:8080: connect: connection refused","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:17:56Z","reason":"ProbeError","message":"Readiness probe error: Get \"http://10.128.0.26:8080/healthz\": dial tcp 10.128.0.26:8080: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:23:32Z","reason":"LeaderElection","message":"package-server-manager-854648ff6d-8qznw_922eedcd-d4a1-42eb-abac-0e0f8126aea1 became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:24:18Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:24:18Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:24:18Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:24:18Z","reason":"InstallCheckFailed","message":"install timeout","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:24:18Z","reason":"NeedsReinstall","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T03:28:06Z","reason":"BackOff","message":"Back-off restarting failed container package-server-manager in pod package-server-manager-854648ff6d-8qznw_openshift-operator-lifecycle-manager(f8711b9f-3d18-4b8d-a263-2c9af9dc68a6)","type":"Warning"}]}events/openshift-etcd-operator.json0000640000000000000000000006150115153166561016220 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:05:59Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-5884b9cd56 to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:06:09Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-5884b9cd56-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:09:31Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-5884b9cd56-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:09:33Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-5884b9cd56-dn4ll","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:10:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.17/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:10:54Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:05Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:05Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" in 87ms (88ms including waiting). Image size: 518384455 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"LeaderElection","message":"etcd-operator-5884b9cd56-dn4ll_deee4ce0-fbdb-47d5-9c68-2f28872819bc became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:09Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:09Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:09Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:09Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:09Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:09Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:11Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:13Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:11:20Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:17:03Z","reason":"BackOff","message":"Back-off restarting failed container etcd-operator in pod etcd-operator-5884b9cd56-dn4ll_openshift-etcd-operator(c6e4afd0-fbcd-49c7-9132-b54c9c28b74b)","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:18:31Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.17:8443/healthz\": dial tcp 10.128.0.17:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:18:31Z","reason":"Killing","message":"Container etcd-operator failed liveness probe, will be restarted","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:24:43Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:24:43Z","reason":"LeaderElection","message":"etcd-operator-5884b9cd56-dn4ll_c83a949d-6dca-4af9-a8a8-e08d17a4d9a1 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:24:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\" to \"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:24:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded changed from False to True (\"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:24:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\" to \"ClusterMemberControllerDegraded: could not get list of unhealthy members: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:24:44Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:24:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\" to \"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:24:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"ClusterMemberControllerDegraded: could not get list of unhealthy members: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\" to \"ClusterMemberControllerDegraded: could not get list of unhealthy members: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:24:49Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/etcd-endpoints has changed\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:24:49Z","reason":"NodeCurrentRevisionChanged","message":"Updated node \"master-0\" from revision 0 to 1 because static pod is ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:24:49Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-endpoints -n openshift-etcd:\ncause by changes in data.91eb892c5ee87610,data.MTkyLjE2OC4zMi4xMA","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:24:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-2 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:24:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-2 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:24:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-2 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:24:56Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-2 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:25:00Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 1 to 2 because node master-0 with revision 1 is the oldest","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:25:02Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:30:18Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:30:18Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:30:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T03:30:31Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.17:8443/healthz\": dial tcp 10.128.0.17:8443: connect: connection refused\nbody: \n","type":"Warning"}]}events/openshift-apiserver.json0000640000000000000000000001251115153166561015445 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:18Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-5f6db9bdd8 to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:18Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-5f6db9bdd8-5hlgc","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : secret \"etcd-client\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:22Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-5f6db9bdd8 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:22Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-5bf974f84f to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:22Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-5bf974f84f-hzx44","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:22Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-5f6db9bdd8-5hlgc","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:26Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:28Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:28Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.35/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:35Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\" in 7.402s (7.402s including waiting). Image size: 589379637 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:36Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:36Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:36Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:36Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:36Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:36Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:37Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T03:11:37Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[-]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa failed: reason withheld\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000011465415153166561017311 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:05:59Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-799b6db4d7 to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:06:09Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-799b6db4d7-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:09:31Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-799b6db4d7-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:09:33Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-799b6db4d7-gstfr","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:10:55Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.12/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:10:55Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"LeaderElection","message":"openshift-apiserver-operator-799b6db4d7-gstfr_0a8da610-e20e-4328-92c7-1eabcd262f51 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:09Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:18Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:20Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:22Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:43Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.34\"}] to [{\"operator\" \"4.18.34\"} {\"openshift-apiserver\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:43Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:43Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:43Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:43Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:43Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:43Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:43Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:11:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:18:47Z","reason":"BackOff","message":"Back-off restarting failed container openshift-apiserver-operator in pod openshift-apiserver-operator-799b6db4d7-gstfr_openshift-apiserver-operator(2a506cf6-bc39-4089-9caa-4c14c4d15c11)","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:19:00Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:19:00Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:24:00Z","reason":"LeaderElection","message":"openshift-apiserver-operator-799b6db4d7-gstfr_b5d4b457-d269-45ef-8840-30874584bc69 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:24:00Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:24:02Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:24:03Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:30:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:30:37Z","reason":"LeaderElection","message":"openshift-apiserver-operator-799b6db4d7-gstfr_3199f0e9-1f42-4ebb-ade5-6965563e3303 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:30:37Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:30:38Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T03:30:39Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000010525615153166561020211 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:05:57Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-5c74bfc494 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:06:07Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-5c74bfc494-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:09:31Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-5c74bfc494-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:09:33Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-5c74bfc494-rz5c8","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:10:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.15/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:10:54Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:05Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:05Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" in 69ms (69ms including waiting). Image size: 506394574 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to False (\"NodeControllerDegraded: All master nodes are ready\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-5c74bfc494-rz5c8_393ca4cb-26b2-4d4c-8f1e-03d225454edc became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:09Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:11Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:20Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:21Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:21Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:22Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:25Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:25Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:33Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:33Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:34Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:34Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:35Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:40Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:42Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:43Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:45Z","reason":"StartingNewRevision","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:45Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:51Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:53Z","reason":"SecretCreated","message":"Created Secret/serving-cert-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:54Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:55Z","reason":"RevisionTriggered","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:11:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:18:49Z","reason":"BackOff","message":"Back-off restarting failed container kube-scheduler-operator-container in pod openshift-kube-scheduler-operator-5c74bfc494-rz5c8_openshift-kube-scheduler-operator(89e15db4-c541-4d53-878d-706fa022f970)","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:19:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:19:03Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:19:03Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:24:40Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-5c74bfc494-rz5c8_70664c01-021b-4de0-b93f-e28425c475f2 became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:24:40Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:24:43Z","reason":"PodCreated","message":"Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:25:16Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"kube-scheduler\" changed from \"\" to \"1.31.14\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:25:16Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"operator\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T03:25:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: status.versions changed from [{\"raw-internal\" \"4.18.34\"}] to [{\"raw-internal\" \"4.18.34\"} {\"kube-scheduler\" \"1.31.14\"} {\"operator\" \"4.18.34\"}]","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000001660415153166561016356 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:11:28Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.34/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:11:28Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:11:28Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:11:28Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:11:37Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:11:41Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.43/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:11:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:11:42Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:11:42Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:11:48Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:11:51Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.51/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:11:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:11:52Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:11:52Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:11:58Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:24:44Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.77/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:24:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:24:45Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:24:45Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:25:16Z","reason":"StaticPodInstallerCompleted","message":"Successfully installed revision 4","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:25:16Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:25:17Z","reason":"Started","message":"Started container wait-for-host-port","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:25:17Z","reason":"Created","message":"Created container: wait-for-host-port","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:25:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:25:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:25:18Z","reason":"Started","message":"Started container kube-scheduler-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:25:18Z","reason":"Created","message":"Created container: kube-scheduler-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:25:19Z","reason":"LeaderElection","message":"master-0_3dbabfe7-74c0-4f66-897d-4626d2b5a6a6 became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:25:19Z","reason":"Created","message":"Created container: kube-scheduler-recovery-controller","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:25:19Z","reason":"Started","message":"Started container kube-scheduler-recovery-controller","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:28:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:28:06Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://192.168.32.10:10259/healthz\": dial tcp 192.168.32.10:10259: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:28:06Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://192.168.32.10:10259/healthz\": dial tcp 192.168.32.10:10259: connect: connection refused","type":"Warning"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:28:06Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://192.168.32.10:10259/healthz\": dial tcp 192.168.32.10:10259: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:28:06Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://192.168.32.10:10259/healthz\": dial tcp 192.168.32.10:10259: connect: connection refused","type":"Warning"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:28:07Z","reason":"Started","message":"Started container kube-scheduler","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T03:28:07Z","reason":"Created","message":"Created container: kube-scheduler","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000014111615153166561022021 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:05:57Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-86d7cdfdfb to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:06:07Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-86d7cdfdfb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:09:31Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-86d7cdfdfb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:09:34Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-86d7cdfdfb-xtwpr","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:10:55Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.20/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:10:55Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"LeaderElection","message":"kube-controller-manager-operator-86d7cdfdfb-xtwpr_4f458fab-b3ed-4605-9232-1292cbbedd54 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"All is well\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-4kdrh\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:09Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:11Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:11Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:11Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:13Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-4kdrh\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:13Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:16Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:18Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:18Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:20Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:20Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:21Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:22Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:22Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:22Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:25Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:30Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:35Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:37Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:38Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:39Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:40Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:41Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.20:37868-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.20:37868-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:41Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:41Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:42Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:45Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:53Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:54Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:55Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:56Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:11:58Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:18:49Z","reason":"BackOff","message":"Back-off restarting failed container kube-controller-manager-operator in pod kube-controller-manager-operator-86d7cdfdfb-xtwpr_openshift-kube-controller-manager-operator(2468d2a3-ec65-4888-a86a-3f66fa311f56)","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:19:01Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:19:02Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:19:02Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:25:10Z","reason":"LeaderElection","message":"kube-controller-manager-operator-86d7cdfdfb-xtwpr_ade4b70c-76f6-44cd-96df-9420d2441e44 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:25:10Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:25:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:25:15Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:25:33Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:30:37Z","reason":"LeaderElection","message":"kube-controller-manager-operator-86d7cdfdfb-xtwpr_665a1375-f66c-405f-bd6d-1f1c4f78c996 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:30:37Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T03:30:41Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000000316115153166561020165 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-08T03:11:47Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-08T03:11:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-08T03:11:47Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-08T03:11:47Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-08T03:25:16Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.82/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-08T03:25:16Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-08T03:25:16Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-08T03:25:16Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000410615153166561016564 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T03:11:32Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-7b545788fb to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T03:11:33Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-7b545788fb-82rjl","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T03:11:35Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.39/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T03:11:35Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T03:11:41Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\" in 5.423s (5.423s including waiting). Image size: 505344964 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T03:11:41Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T03:11:41Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T03:11:42Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T03:11:42Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T03:11:42Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000402115153166561015114 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-03-08T03:11:29Z","reason":"SuccessfulCreate","message":"Created pod: router-default-79f8cd6fdd-tkxj9","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-08T03:11:29Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-79f8cd6fdd to 1","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-08T03:24:03.780852Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-08T03:24:08Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032\"","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-08T03:24:11Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032\" in 2.467s (2.467s including waiting). Image size: 487151732 bytes.","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-08T03:24:11Z","reason":"Created","message":"Created container: router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-08T03:24:11Z","reason":"Started","message":"Started container router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-08T03:24:20Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-08T03:24:21Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [-]backend-http failed: reason withheld\n[-]has-synced failed: reason withheld\n[+]process-running ok\nhealthz check failed\n\n","type":"Warning"}]}events/openshift-authentication-operator.json0000640000000000000000000023406115153166561020323 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:05:59Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-7c6989d6c4 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:06:10Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-7c6989d6c4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:09:31Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-7c6989d6c4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:09:33Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-7c6989d6c4-k8xgg","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:10:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.7/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:10:54Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"LeaderElection","message":"authentication-operator-7c6989d6c4-k8xgg_6a14572e-803c-47dc-8f39-fe84056985c0 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:06Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"),Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:07Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \",Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\\"oauthConfig\\\": map[string]any{\\n+ \\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+ \\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+ \\t\\t\\t\\\"templates\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+ \\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n+ \\t\\t\\\"serverArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+ \\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+ \\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+ \\t\\t},\\n+ \\t\\t\\\"servingInfo\\\": map[string]any{\\n+ \\t\\t\\t\\\"cipherSuites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:10Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:11Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:11Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+ \\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+ \\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:11Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:11Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:11Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-xmztk\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-xmztk\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:12Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:13Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:14Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:18Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:18Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:18Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:19Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:21Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:25Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:25Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:25Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:25Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:25Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:28Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:31Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:32Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:33Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:33Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:36Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:37Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:37Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:37Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any{\\n \\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n \\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n \\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n \\t\\\"servingInfo\\\": map[string]any{\\n \\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n \\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t\\\"namedCertificates\\\": []any{\\n+ \\t\\t\\tmap[string]any{\\n+ \\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n \\t},\\n \\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n }\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:44Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.34\"}] to [{\"operator\" \"4.18.34\"} {\"oauth-apiserver\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:11:48Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:12:54Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.7:8443/healthz\": dial tcp 10.128.0.7:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:12:54Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.7:8443/healthz\": dial tcp 10.128.0.7:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:18:35Z","reason":"Killing","message":"Container authentication-operator failed liveness probe, will be restarted","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:18:35Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:18:35Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.7:8443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:18:35Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.7:8443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:18:35Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:18:35Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:23:45Z","reason":"LeaderElection","message":"authentication-operator-7c6989d6c4-k8xgg_95afbd7e-493b-4038-8920-114c303aed7c became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:23:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from False to True (\"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:23:49Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:23:49Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:23:54Z","reason":"SecretCreated","message":"Created Secret/webhook-authentication-integrated-oauth -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:23:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T03:24:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.230.117:443/healthz\\\": dial tcp 172.30.230.117:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015153166561016301 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-08T03:11:32Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-08T03:11:33Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003434715153166521014620 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":332,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-canary":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-config-server","secrets":1},{"name":"machine-os-builder","secrets":1},{"name":"machine-os-puller","secrets":1},{"name":"node-bootstrapper","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-state-metrics","secrets":1},{"name":"metrics-server","secrets":1},{"name":"node-exporter","secrets":1},{"name":"openshift-state-metrics","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/node/logs/master-0.log0000640000000000000000000002452315153166056014547 0ustar0000000000000000Mar 08 03:24:24.327852 master-0 kubenswrapper[7387]: E0308 03:24:24.327785 7387 secret.go:189] Couldn't get secret openshift-monitoring/node-exporter-tls: secret "node-exporter-tls" not found Mar 08 03:24:24.328107 master-0 kubenswrapper[7387]: E0308 03:24:24.327897 7387 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/beed862c-6283-4568-aa2e-f49b31e30a3b-node-exporter-tls podName:beed862c-6283-4568-aa2e-f49b31e30a3b nodeName:}" failed. No retries permitted until 2026-03-08 03:24:24.827850697 +0000 UTC m=+801.222326378 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "node-exporter-tls" (UniqueName: "kubernetes.io/secret/beed862c-6283-4568-aa2e-f49b31e30a3b-node-exporter-tls") pod "node-exporter-sjs7q" (UID: "beed862c-6283-4568-aa2e-f49b31e30a3b") : secret "node-exporter-tls" not found Mar 08 03:24:24.331323 master-0 kubenswrapper[7387]: E0308 03:24:24.330918 7387 secret.go:189] Couldn't get secret openshift-monitoring/kube-state-metrics-tls: secret "kube-state-metrics-tls" not found Mar 08 03:24:24.331323 master-0 kubenswrapper[7387]: E0308 03:24:24.330994 7387 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/bfc9ae4f-eb67-4ed1-97a1-d67e839fd601-kube-state-metrics-tls podName:bfc9ae4f-eb67-4ed1-97a1-d67e839fd601 nodeName:}" failed. No retries permitted until 2026-03-08 03:24:24.830971799 +0000 UTC m=+801.225447480 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-state-metrics-tls" (UniqueName: "kubernetes.io/secret/bfc9ae4f-eb67-4ed1-97a1-d67e839fd601-kube-state-metrics-tls") pod "kube-state-metrics-68b88f8cb5-vxn59" (UID: "bfc9ae4f-eb67-4ed1-97a1-d67e839fd601") : secret "kube-state-metrics-tls" not found Mar 08 03:24:34.450295 master-0 kubenswrapper[7387]: E0308 03:24:34.448539 7387 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="dd1c09ba-b44c-446a-abe0-53ac3e910a77" containerName="controller-manager" Mar 08 03:24:34.450295 master-0 kubenswrapper[7387]: E0308 03:24:34.448572 7387 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="dd1c09ba-b44c-446a-abe0-53ac3e910a77" containerName="controller-manager" Mar 08 03:24:34.961231 master-0 kubenswrapper[7387]: E0308 03:24:34.961175 7387 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"41ca15e4a6ad4847ca08ee2bbd0a8d8131abfdfd04eefcf604b4ac8e41fe27f8\": container with ID starting with 41ca15e4a6ad4847ca08ee2bbd0a8d8131abfdfd04eefcf604b4ac8e41fe27f8 not found: ID does not exist" containerID="41ca15e4a6ad4847ca08ee2bbd0a8d8131abfdfd04eefcf604b4ac8e41fe27f8" Mar 08 03:24:34.962230 master-0 kubenswrapper[7387]: E0308 03:24:34.962188 7387 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"101ea5b74925f2629d3b673abc3df2646b2971ed5a02a4d33f72d8e0bafc02dc\": container with ID starting with 101ea5b74925f2629d3b673abc3df2646b2971ed5a02a4d33f72d8e0bafc02dc not found: ID does not exist" containerID="101ea5b74925f2629d3b673abc3df2646b2971ed5a02a4d33f72d8e0bafc02dc" Mar 08 03:24:37.242171 master-0 kubenswrapper[7387]: E0308 03:24:37.242087 7387 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e2495994-736c-4916-b210-ff5633f3387d" containerName="route-controller-manager" Mar 08 03:24:37.242171 master-0 kubenswrapper[7387]: E0308 03:24:37.242134 7387 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e2495994-736c-4916-b210-ff5633f3387d" containerName="route-controller-manager" Mar 08 03:24:43.512349 master-0 kubenswrapper[7387]: E0308 03:24:43.512329 7387 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e2495994-736c-4916-b210-ff5633f3387d" containerName="route-controller-manager" Mar 08 03:24:44.998442 master-0 kubenswrapper[7387]: E0308 03:24:44.998340 7387 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="15f50c071f201867c43246dac6f792f0b50269dfa6fccfc5c002806ce76a47a5" cmd=["/bin/bash","-c","test -f /ready/ready"] Mar 08 03:24:44.999996 master-0 kubenswrapper[7387]: E0308 03:24:44.999873 7387 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="15f50c071f201867c43246dac6f792f0b50269dfa6fccfc5c002806ce76a47a5" cmd=["/bin/bash","-c","test -f /ready/ready"] Mar 08 03:24:45.001731 master-0 kubenswrapper[7387]: E0308 03:24:45.001621 7387 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="15f50c071f201867c43246dac6f792f0b50269dfa6fccfc5c002806ce76a47a5" cmd=["/bin/bash","-c","test -f /ready/ready"] Mar 08 03:24:45.001731 master-0 kubenswrapper[7387]: E0308 03:24:45.001719 7387 prober.go:104] "Probe errored" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" probeType="Readiness" pod="openshift-multus/cni-sysctl-allowlist-ds-9cmmj" podUID="645d8c66-50e1-4e0e-ae02-5a766526652e" containerName="kube-multus-additional-cni-plugins" Mar 08 03:24:54.997759 master-0 kubenswrapper[7387]: E0308 03:24:54.997598 7387 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="15f50c071f201867c43246dac6f792f0b50269dfa6fccfc5c002806ce76a47a5" cmd=["/bin/bash","-c","test -f /ready/ready"] Mar 08 03:24:54.999052 master-0 kubenswrapper[7387]: E0308 03:24:54.999012 7387 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="15f50c071f201867c43246dac6f792f0b50269dfa6fccfc5c002806ce76a47a5" cmd=["/bin/bash","-c","test -f /ready/ready"] Mar 08 03:24:55.004254 master-0 kubenswrapper[7387]: E0308 03:24:55.004167 7387 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="15f50c071f201867c43246dac6f792f0b50269dfa6fccfc5c002806ce76a47a5" cmd=["/bin/bash","-c","test -f /ready/ready"] Mar 08 03:24:55.004254 master-0 kubenswrapper[7387]: E0308 03:24:55.004241 7387 prober.go:104] "Probe errored" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" probeType="Readiness" pod="openshift-multus/cni-sysctl-allowlist-ds-9cmmj" podUID="645d8c66-50e1-4e0e-ae02-5a766526652e" containerName="kube-multus-additional-cni-plugins" Mar 08 03:25:05.030459 master-0 kubenswrapper[7387]: E0308 03:25:05.030360 7387 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="15f50c071f201867c43246dac6f792f0b50269dfa6fccfc5c002806ce76a47a5" cmd=["/bin/bash","-c","test -f /ready/ready"] Mar 08 03:25:05.032805 master-0 kubenswrapper[7387]: E0308 03:25:05.032617 7387 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="15f50c071f201867c43246dac6f792f0b50269dfa6fccfc5c002806ce76a47a5" cmd=["/bin/bash","-c","test -f /ready/ready"] Mar 08 03:25:05.034631 master-0 kubenswrapper[7387]: E0308 03:25:05.034579 7387 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="15f50c071f201867c43246dac6f792f0b50269dfa6fccfc5c002806ce76a47a5" cmd=["/bin/bash","-c","test -f /ready/ready"] Mar 08 03:25:05.037125 master-0 kubenswrapper[7387]: E0308 03:25:05.034758 7387 prober.go:104] "Probe errored" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" probeType="Readiness" pod="openshift-multus/cni-sysctl-allowlist-ds-9cmmj" podUID="645d8c66-50e1-4e0e-ae02-5a766526652e" containerName="kube-multus-additional-cni-plugins" Mar 08 03:25:09.225128 master-0 kubenswrapper[7387]: E0308 03:25:09.225070 7387 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"15f50c071f201867c43246dac6f792f0b50269dfa6fccfc5c002806ce76a47a5\": container with ID starting with 15f50c071f201867c43246dac6f792f0b50269dfa6fccfc5c002806ce76a47a5 not found: ID does not exist" containerID="15f50c071f201867c43246dac6f792f0b50269dfa6fccfc5c002806ce76a47a5" Mar 08 03:25:15.444471 master-0 kubenswrapper[7387]: E0308 03:25:15.444406 7387 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="645d8c66-50e1-4e0e-ae02-5a766526652e" containerName="kube-multus-additional-cni-plugins" Mar 08 03:25:15.444746 master-0 kubenswrapper[7387]: E0308 03:25:15.444511 7387 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="4c72cba0-0e56-43a8-b4dc-be4d61d8586e" containerName="installer" Mar 08 03:25:16.442595 master-0 kubenswrapper[7387]: E0308 03:25:16.442505 7387 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="a1a56802af72ce1aac6b5077f1695ac0" containerName="kube-scheduler" Mar 08 03:25:16.443005 master-0 kubenswrapper[7387]: E0308 03:25:16.442982 7387 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="a1a56802af72ce1aac6b5077f1695ac0" containerName="kube-scheduler" Mar 08 03:25:19.328000 master-0 kubenswrapper[7387]: E0308 03:25:19.327958 7387 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"4d2476856e29b23f71b3efa17f6e2d132475b3255bd78a4c4c27299dcf99f68f\": container with ID starting with 4d2476856e29b23f71b3efa17f6e2d132475b3255bd78a4c4c27299dcf99f68f not found: ID does not exist" containerID="4d2476856e29b23f71b3efa17f6e2d132475b3255bd78a4c4c27299dcf99f68f"aggregated/unused_machine_configs_count.json0000640000000000000000000000004215153166056020140 0ustar0000000000000000{"unused_machineconfigs_count":21}config/machineconfigs/rendered-worker-becd8e457b9b3daca15ad980f999f2f0.json0000640000000000000000000004054015153166056024363 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"d4eb710b17481f468c73d93c876a385253a863e0","machineconfiguration.openshift.io/release-image-version":"4.18.34"},"creationTimestamp":"2026-03-08T03:24:13Z","generation":1,"name":"rendered-worker-becd8e457b9b3daca15ad980f999f2f0","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"worker","uid":"6b3b5ed3-9c0a-482d-9efb-6efafa46cee0"}],"resourceVersion":"10903","uid":"3a7640ee-d873-479f-8445-f16d78b6e6d9"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:25968f175e97edd03d85d1cdff3b3d2de25e08c55e75d18285788b825a35e3f3","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/worker,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n --cloud-provider= \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1d605384f31a8085f78a96145c2c3dc51afe22721144196140a2699b7c07ebe3 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bfcd8017eede3fb66fa3f5b47c27508b787d38455689154461f0e6a5dc303ff \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"}]}},"extensions":[],"fips":false,"kernelArguments":["systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:488c7559709f4747b9cc29de1db18038270193dc7acdb546c94a33dc077504e2"}}config/machineconfigs/rendered-master-bc6bfb4764e126da413b020ccd1d8bd2.json0000640000000000000000000004333015153166056024216 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"d4eb710b17481f468c73d93c876a385253a863e0","machineconfiguration.openshift.io/release-image-version":"4.18.34"},"creationTimestamp":"2026-03-08T03:24:13Z","generation":1,"name":"rendered-master-bc6bfb4764e126da413b020ccd1d8bd2","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"master","uid":"3b7ade1a-4507-4307-8e19-e5676cc30a40"}],"resourceVersion":"10905","uid":"21c2b1e4-910a-4b2e-8ddd-9a31ad834226"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:25968f175e97edd03d85d1cdff3b3d2de25e08c55e75d18285788b825a35e3f3","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"disks":[{"device":"/dev/vdc","wipeTable":true},{"device":"/dev/vdd","wipeTable":true},{"device":"/dev/vde","wipeTable":true}],"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/control-plane,node-role.kubernetes.io/master,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --cloud-provider= \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --register-with-taints=node-role.kubernetes.io/master=:NoSchedule \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1d605384f31a8085f78a96145c2c3dc51afe22721144196140a2699b7c07ebe3 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bfcd8017eede3fb66fa3f5b47c27508b787d38455689154461f0e6a5dc303ff \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"},{"contents":"# See https://github.com/openshift/machine-config-operator/issues/1897\n[Service]\nNice=10\nIOSchedulingClass=best-effort\nIOSchedulingPriority=6\n","name":"mco-controlplane-nice.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"},{"contents":"[Unit]\nDescription=Run dnsmasq to provide local dns for Single Node OpenShift\nBefore=kubelet.service crio.service\nAfter=network.target ovs-configuration.service\n\n[Service]\nTimeoutStartSec=30\nExecStartPre=/usr/local/bin/dnsmasq_config.sh\nExecStart=/usr/sbin/dnsmasq -k\nRestart=always\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"dnsmasq.service"},{"enabled":true,"name":"iscsid.service"},{"contents":"[Unit]\nDescription=Create logical volume with name cinder-volumes.\nAfter=var.mount systemd-udev-settle.service\n\n[Service]\nType=oneshot\nExecCondition=/bin/bash -c '! /usr/sbin/vgdisplay cinder-volumes'\nExecStartPre=/usr/sbin/pvcreate /dev/vdc /dev/vdd /dev/vde\nExecStart=/usr/sbin/vgcreate cinder-volumes /dev/vdc /dev/vdd /dev/vde\nRemainAfterExit=yes\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"lv-cinder-volumes.service"},{"enabled":true,"name":"multipathd.service"}]}},"extensions":[],"fips":false,"kernelArguments":["net.ifnames=0","systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:488c7559709f4747b9cc29de1db18038270193dc7acdb546c94a33dc077504e2"}}config/clusteroperator/storage.json0000640000000000000000000000346715153166056016323 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"226b317a-b6fe-4a96-a13a-8711b9b3d66c","resourceVersion":"10637","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected","message":"DefaultStorageClassControllerAvailable: No default StorageClass for this platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315153166056016666 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"88d14fab-28d8-4d13-ae44-51d0addbd1ba","resourceVersion":"4873","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:11:11Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:11:09Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:09Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000305215153166056024665 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"5ae5a55c-fc26-48e6-84ba-0361b083dd21","resourceVersion":"11042","generation":1,"creationTimestamp":"2026-03-08T03:05:43Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:11:47Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-08T03:11:47Z","reason":"ClusterServiceVersionNotSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Failed with reason: InstallCheckFailed, message: install timeout"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T03:24:18Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:48Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255515153166056023464 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"c7ccea78-8f76-4194-bd34-8ce1064b4de3","resourceVersion":"8880","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:11:47Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:18:27Z","message":"Deployed 4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:11:47Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:47Z"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115153166056022050 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"bf2d2467-4e09-4c46-b842-1d448f283502","resourceVersion":"7396","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:11:47Z","message":"Deployed 4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:11:47Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:11:47Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:47Z"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315153166056020312 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"b68c2b63-0c0b-4585-84c5-dfc610e6dc07","resourceVersion":"841","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000346215153166056022442 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"3f483f13-cb7e-4b6d-94a7-ebdadca04dd0","resourceVersion":"11910","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:11:08Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:24:53Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:24:53Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:12Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T03:11:08Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215153166056020644 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"cb1428c3-ee21-4d16-8548-5a56ea5dc563","resourceVersion":"7251","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:11:08Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:11:43Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-08T03:11:09Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:07Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"openshift-apiserver","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420415153166056015435 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"a73447c6-d378-4100-ab23-fad4aeef76ab","resourceVersion":"7714","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:11:16Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:11:51Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:11:51Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:16Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T03:11:16Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115153166056017074 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"54ecaea6-1835-457f-b62d-d6e842747053","resourceVersion":"5790","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:11:21Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.34\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:11:22Z","reason":"AsExpected","message":"Cluster version is \"4.18.34\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:11:20Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.34"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003614415153166056016346 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"29178009-2070-4581-9c22-d51925b5bf86","resourceVersion":"11871","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-03-08T03:09:59Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:09:48Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:09:48Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:24:48Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:11:06Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715153166056017040 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"51cfe7a9-d825-4dda-8137-eb4debbe89f6","resourceVersion":"6945","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-03-08T03:11:41Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-03-08T03:11:41Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T03:11:41Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:41Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315153166056017135 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"26fdf12d-bb53-4124-8123-6262877811ef","resourceVersion":"7004","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:11:42Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.34"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:11:42Z","reason":"OperatorAvailable","message":"Available release version: 4.18.34"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:42Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:11:42Z","reason":"OperatorAvailable","message":"Available release version: 4.18.34"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000546315153166056017524 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"c93241d6-2bf8-46c5-8f82-d7cb7dbcbb1a","resourceVersion":"11382","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:24:21Z","message":"Cluster version is 4.18.34"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:24:21Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:24:13Z","reason":"AsExpected","message":"Cluster has deployed [{operator 4.18.34} {operator-image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c}]"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:24:13Z","reason":"AsExpected"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-08T03:24:13Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"operator-image","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"operator.openshift.io","resource":"machineconfigurations","name":""},{"group":"","resource":"nodes","name":""},{"group":"","resource":"namespaces","name":"openshift-kni-infra"},{"group":"","resource":"namespaces","name":"openshift-openstack-infra"},{"group":"","resource":"namespaces","name":"openshift-ovirt-infra"},{"group":"","resource":"namespaces","name":"openshift-vsphere-infra"},{"group":"","resource":"namespaces","name":"openshift-nutanix-infra"},{"group":"","resource":"namespaces","name":"openshift-cloud-platform-infra"}],"extension":{"master":"all 1 nodes are at latest configuration rendered-master-bc6bfb4764e126da413b020ccd1d8bd2","worker":"all 0 nodes are at latest configuration rendered-worker-becd8e457b9b3daca15ad980f999f2f0"}}}config/clusteroperator/machine-approver.json0000640000000000000000000000253315153166056020110 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"7f938c95-e34d-4cd5-b325-21941431d832","resourceVersion":"11099","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:24:20Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.34"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:24:20Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:24:20Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:24:20Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371415153166056017025 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"4bbfd637-4ff9-4862-a602-33b1ea827f6f","resourceVersion":"11748","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:24:42Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:24:42Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:24:42Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:24:42Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315153166056022545 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"84a0a00e-c0a4-439f-a559-22de0050aa29","resourceVersion":"5098","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:11:14Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:11:14Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000430515153166056017551 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"a76b71bc-e64f-4297-9cb3-b349b1063210","resourceVersion":"12063","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T03:11:22Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-08T03:11:07Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"},{"name":"kube-scheduler","version":"1.31.14"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000430015153166056021361 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"6fad940d-7805-4e63-b2aa-b8affb0498c4","resourceVersion":"12032","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:11:07Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T03:11:42Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-08T03:11:09Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:07Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T03:11:07Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000520015153166056017566 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"101db40c-1ace-45eb-a471-0b181927dfac","resourceVersion":"12031","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:10:56Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T03:11:51Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-08T03:10:57Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:10:57Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-08T03:10:56Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000534115153166056016500 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"16273b0e-614b-4056-bc85-8feaf7441bb0","resourceVersion":"10654","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"ClusterTransferAvailable","status":"Unknown","lastTransitionTime":"2026-03-08T03:24:03Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected","message":"Monitoring the cluster"},{"type":"RemoteConfigurationAvailable","status":"True","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected"},{"type":"RemoteConfigurationValid","status":"True","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected"},{"type":"SCAAvailable","status":"Unknown","lastTransitionTime":"2026-03-08T03:24:03Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"InsightsUpgradeable","message":"Insights operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-insights"},{"group":"apps","resource":"deployments","namespace":"openshift-insights","name":"insights-operator"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"pull-secret"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"support"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"gather"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"operator"},{"group":"","resource":"services","namespace":"openshift-insights","name":"metrics"},{"group":"","resource":"configmaps","namespace":"openshift-insights","name":"service-ca-bundle"},{"group":"operator.openshift.io","resource":"insightsoperators","name":"cluster"}],"extension":{"lastReportTime":null}}}config/clusteroperator/ingress.json0000640000000000000000000000467615153166056016334 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"29e2bb34-c633-43ff-abeb-cc3e4ab7a1e5","resourceVersion":"9870","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:11:31Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T03:11:29Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:11:30Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:29Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-08T03:11:29Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-ingress-canary"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715153166056017600 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"49ad5e7b-b1ab-47d0-bb9f-01358357425a","resourceVersion":"853","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000402715153166056015567 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"19e69ee9-5925-4213-9d25-72f36753c003","resourceVersion":"11954","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:24:49Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready\nEtcdMembersDegraded: No unhealthy members found"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T03:25:00Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 1; 0 nodes have achieved new revision 2"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:24:49Z","reason":"AsExpected","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1; 0 nodes have achieved new revision 2\nEtcdMembersAvailable: 1 members are available"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"},{"name":"etcd","version":"4.18.34"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515153166056015442 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"3d7be521-a8a8-46cd-8334-39bf6c89ab30","resourceVersion":"7843","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:11:58Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:11:29Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:11:58Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:28Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715153166056021444 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"dcac36b0-edba-43af-845e-fc91f796b30a","resourceVersion":"4785","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:11:11Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:11:11Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"csi-snapshot-controller","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263615153166056021624 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"c2fe75d4-caa2-402b-a62b-1dc9251050b4","resourceVersion":"11147","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:24:22Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:24:22Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:24:22Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:24:22Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215153166056016304 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"7090f9f7-2753-4045-90e8-e02cf8829ee9","resourceVersion":"734","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615153166056017744 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"01de3039-21a1-4b07-97ff-e5720fc675c6","resourceVersion":"4856","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:11:11Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:11:11Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:11:11Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:11Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T03:11:11Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.34"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000266015153166056020472 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"be214934-88ba-4dfa-b880-7aec11d32548","resourceVersion":"11749","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:24:31Z","reason":"AsExpected","message":"at version 4.18.34"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:24:42Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:24:42Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:24:31Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000002022415153166056020063 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"2f724747-8f67-469a-9867-7d8fbe7ad33e","resourceVersion":"11647","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:05:48Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:05:48Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:24:35Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:05:48Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-gcp-ro-creds"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-iam-ro"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-azure-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-ccm"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ibm-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-nutanix-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-openstack-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-powervs-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000440215153166056021544 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"0a1fa621-8c55-4038-b99a-0a9b857330c1","resourceVersion":"10625","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"CloudConfigControllerAvailable","status":"True","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"CloudConfigControllerDegraded","status":"False","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"TrustedCABundleControllerControllerAvailable","status":"True","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"TrustedCABundleControllerControllerDegraded","status":"False","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected","message":"Cluster Cloud Controller Manager Operator is available at 4.18.34"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:24:03Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"},{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427115153166056016605 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"9cc5d72e-eaef-4cfc-bc45-a6c641ccced2","resourceVersion":"10433","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:23:58Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:23:58Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:23:58Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:23:58Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-08T03:23:58Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000727615153166056017700 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"afdcaca3-aafd-4f19-8208-9c675e301330","resourceVersion":"10751","generation":1,"creationTimestamp":"2026-03-08T03:05:42Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"True","lastTransitionTime":"2026-03-08T03:23:45Z","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.230.117:443/healthz\": dial tcp 172.30.230.117:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T03:11:48Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-08T03:11:07Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.230.117:443/healthz\": dial tcp 172.30.230.117:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"oauth-apiserver","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/running_containers.json0000640000000000000000000001164715153166056015326 0ustar0000000000000000{"images":{"0":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","1":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","10":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","11":"sha256:d470dba32064cc62b2ab29303d6e00612304548262eaa2f4e5b40a00a26f71ce","12":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","13":"sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","14":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","15":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","16":"sha256:3888758fa24689d4e63dfb78ed97a852c687295adcabdabf8cdc4a2beaa42398","17":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","18":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","19":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","2":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","20":"sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245","21":"sha256:b9b8bc43bac294be3c7669cde049e388ad9d8751242051ba40f83e1c401eceda","22":"sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e","23":"sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06","24":"sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","25":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","26":"registry.redhat.io/redhat/certified-operator-index:v4.18","27":"sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d","28":"sha256:bececf32872455775075a3d35100302396ca58ae29827b24d7df086d8ac14432","29":"sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032","3":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","30":"sha256:bc516f6eb3028f5169f1712ac1878d4b591174fd7c363f4ee5aa63162aa01b0e","31":"sha256:b8cb5e0caeca0fb02f3e8c72b7ddf1c49e3c602e42e119ba30c60525f1db1821","32":"registry.redhat.io/redhat/community-operator-index:v4.18","33":"sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9","34":"sha256:3bedf16a5f527126e934c37d2f24886de4a54c9bd9d45b18821d02eefd8b5f9e","35":"sha256:28f33d62fd0b94c5ea0ebcd7a4216848c8dd671a38d901ce98f4c399b700e1c7","36":"sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5","37":"sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955","38":"sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626","39":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","4":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","40":"sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7","41":"sha256:9bd0b71d620cf0acbfcd1b58797dc30050bd167cb6b7a7f62c8333dd370c76d5","42":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","43":"sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","44":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","45":"sha256:00b591b3820682dc99f16f07a3a0a4ec06dfedba63cd0f79b998ac4509fabea3","46":"registry.redhat.io/redhat/redhat-operator-index:v4.18","47":"sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7","48":"sha256:b714a7ada1e295b599b432f32e1fd5b74c8cdbe6fe51e95306322b25cb873914","49":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","5":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","50":"sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1","51":"sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","52":"sha256:042e6a37747405da54cf91543d44408c9531327a2cce653c41ca851aa7c896d8","53":"sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","54":"sha256:3ef4b76f6b989bf3e802d22aff457a019d9c232f0ea8d927ac6ce2d854fe48d7","55":"sha256:2508a5f66e509e813cb09825b5456be91b4cdd4d02f470f22a33de42c753f2b7","56":"sha256:243ce0f08a360370edf4960aec94fc6c5be9d4aae26cf8c5320adcd047c1b14f","57":"sha256:ebee49810f493f9b566740bd61256fd40b897cc51423f1efa01a02bb57ce177d","58":"sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916","6":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","7":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","8":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","9":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053"},"containers":{"2026-03":{"0":22,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":2,"17":2,"18":2,"19":2,"2":7,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":6,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":5,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"49":1,"5":4,"50":1,"51":1,"52":1,"53":1,"54":1,"55":1,"56":1,"57":1,"58":1,"6":4,"7":3,"8":3,"9":2}}}config/pod/openshift-service-ca/service-ca-84bfdbbb7f-jnpl5.json0000640000000000000000000001606115153166056023073 0ustar0000000000000000{"metadata":{"name":"service-ca-84bfdbbb7f-jnpl5","generateName":"service-ca-84bfdbbb7f-","namespace":"openshift-service-ca","uid":"7af634f0-65ac-402a-acd6-a8aad11b37ab","resourceVersion":"8750","creationTimestamp":"2026-03-08T03:11:09Z","labels":{"app":"service-ca","pod-template-hash":"84bfdbbb7f","service-ca":"true"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.30/23\"],\"mac_address\":\"0a:58:0a:80:00:1e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.30/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.30\"\n ],\n \"mac\": \"0a:58:0a:80:00:1e\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"service-ca-84bfdbbb7f","uid":"7d8a3b12-7a27-486d-95ca-f23d98523223","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"signing-key","secret":{"secretName":"signing-key","defaultMode":420}},{"name":"signing-cabundle","configMap":{"name":"signing-cabundle","defaultMode":420}},{"name":"kube-api-access-sm9tk","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"service-ca-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","command":["service-ca-operator","controller"],"args":["-v=2"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"120Mi"}},"volumeMounts":[{"name":"signing-key","mountPath":"/var/run/secrets/signing-key"},{"name":"signing-cabundle","mountPath":"/var/run/configmaps/signing-cabundle"},{"name":"kube-api-access-sm9tk","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000570000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"service-ca","serviceAccount":"service-ca","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c24,c9"},"fsGroup":1000570000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:10Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:09Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:18:50Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:18:50Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:09Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.30","podIPs":[{"ip":"10.128.0.30"}],"startTime":"2026-03-08T03:11:09Z","containerStatuses":[{"name":"service-ca-controller","state":{"running":{"startedAt":"2026-03-08T03:18:49Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"W0308 03:17:04.744290 1 cmd.go:257] Using insecure, self-signed certificates\nI0308 03:17:04.744617 1 crypto.go:601] Generating new CA for service-ca-controller-signer@1772939824 cert, and key in /tmp/serving-cert-3421648725/serving-signer.crt, /tmp/serving-cert-3421648725/serving-signer.key\nI0308 03:17:05.249556 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0308 03:17:05.249839 1 observer_polling.go:159] Starting file observer\nI0308 03:17:05.250174 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0308 03:17:05.250191 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nW0308 03:18:05.259402 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nI0308 03:18:05.259578 1 builder.go:304] service-ca-controller version -\nI0308 03:18:05.260722 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/tmp/serving-cert-3421648725/tls.crt::/tmp/serving-cert-3421648725/tls.key\"\nF0308 03:18:35.897013 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-service-ca/leases/service-ca-controller-lock\": context deadline exceeded\n","startedAt":"2026-03-08T03:17:04Z","finishedAt":"2026-03-08T03:18:35Z","containerID":"cri-o://7d5086bc52f5bb65f0e405da68bda521bfa3fc867442a2ce84f387697f4853be"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","containerID":"cri-o://4ba849afa6c1096c68700ba2a3716f297bd7a9a7ae2cf94f600da7b5f14c3033","started":true,"volumeMounts":[{"name":"signing-key","mountPath":"/var/run/secrets/signing-key"},{"name":"signing-cabundle","mountPath":"/var/run/configmaps/signing-cabundle"},{"name":"kube-api-access-sm9tk","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-service-ca-operator/service-ca-operator-69b6fc6b88-vjmf6.json0000640000000000000000000001611015153166056026345 0ustar0000000000000000{"metadata":{"name":"service-ca-operator-69b6fc6b88-vjmf6","generateName":"service-ca-operator-69b6fc6b88-","namespace":"openshift-service-ca-operator","uid":"1fa64f1b-9f10-488b-8f94-1600774062c4","resourceVersion":"8790","creationTimestamp":"2026-03-08T03:09:34Z","labels":{"app":"service-ca-operator","pod-template-hash":"69b6fc6b88"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.18/23\"],\"mac_address\":\"0a:58:0a:80:00:12\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.18/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.18\"\n ],\n \"mac\": \"0a:58:0a:80:00:12\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"service-ca-operator-69b6fc6b88","uid":"df68b7f3-dcd6-4516-a4ee-01243e46d265","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"service-ca-operator-config","defaultMode":420}},{"name":"kube-api-access-8k2lp","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"service-ca-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","command":["service-ca-operator","operator"],"args":["--config=/var/run/configmaps/config/operator-config.yaml","-v=2"],"env":[{"name":"CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"}],"resources":{"requests":{"cpu":"10m","memory":"80Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-8k2lp","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"service-ca-operator","serviceAccount":"service-ca-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c14"},"runAsUser":1001,"runAsGroup":1001,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:19:05Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:19:05Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.18","podIPs":[{"ip":"10.128.0.18"}],"startTime":"2026-03-08T03:10:53Z","containerStatuses":[{"name":"service-ca-operator","state":{"running":{"startedAt":"2026-03-08T03:19:04Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0308 03:17:04.708057 1 cmd.go:253] Using service-serving-cert provided certificates\nI0308 03:17:04.708183 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0308 03:17:04.708896 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0308 03:17:04.708924 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0308 03:17:04.710694 1 observer_polling.go:159] Starting file observer\nW0308 03:18:04.715561 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nI0308 03:18:04.715719 1 builder.go:304] service-ca-operator version -\nI0308 03:18:04.716764 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nF0308 03:18:35.152166 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-service-ca-operator/leases/service-ca-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-08T03:17:04Z","finishedAt":"2026-03-08T03:18:35Z","containerID":"cri-o://c5943b694a77c0302101d6a324348e34a33f4a5d12b160d170755271c5624f54"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","containerID":"cri-o://0fe962616e00ad1f24a82e68fd64a4be663ed91d0dbf2ea81de6089d37bf0513","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-8k2lp","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}operator-controller-controller-manager-6598bfb6c4-c74s2.json0000640000000000000000000002474315153166056032203 0ustar0000000000000000config/pod/openshift-operator-controller{"metadata":{"name":"operator-controller-controller-manager-6598bfb6c4-c74s2","generateName":"operator-controller-controller-manager-6598bfb6c4-","namespace":"openshift-operator-controller","uid":"399c5025-da66-4c52-8e68-ea6c996d9cc8","resourceVersion":"8347","creationTimestamp":"2026-03-08T03:11:34Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"6598bfb6c4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.41/23\"],\"mac_address\":\"0a:58:0a:80:00:29\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.41/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.41\"\n ],\n \"mac\": \"0a:58:0a:80:00:29\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-6598bfb6c4","uid":"559e3904-a139-4a85-99c9-14fec3634a8c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-vr9bw","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-vr9bw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-vr9bw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:35Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:18:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:18:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.41","podIPs":[{"ip":"10.128.0.41"}],"startTime":"2026-03-08T03:11:35Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-08T03:11:36Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://378037d391e3dcdb0053d43d901a7ee5851d33db4a955457fbfbc1974763fcfd","started":true,"volumeMounts":[{"name":"kube-api-access-vr9bw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-08T03:15:56Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"rollerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"b1859481-0d80-4a97-9f3b-103fe013544a\"\nI0308 03:11:48.050998 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"b1859481-0d80-4a97-9f3b-103fe013544a\"\nI0308 03:11:48.102311 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"9954dea5-c97f-401b-99f2-308c042d22fb\"\nI0308 03:11:48.102371 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"9954dea5-c97f-401b-99f2-308c042d22fb\"\nE0308 03:12:36.631881 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0308 03:13:36.634534 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI0308 03:13:49.628303 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE0308 03:13:49.628475 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-08T03:11:36Z","finishedAt":"2026-03-08T03:13:49Z","containerID":"cri-o://a8f3f14f501b72ff362550257f13a332eecf70ec4f446aeb3d199baf5fd9fcca"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","containerID":"cri-o://1341190aa2856a973f485203a951081b82fd1c38dd7ccb12a11db05205beefcc","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-vr9bw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/network-operator-7c649bf6d4-wxrfp.json0000640000000000000000000002325715153166056025610 0ustar0000000000000000{"metadata":{"name":"network-operator-7c649bf6d4-wxrfp","generateName":"network-operator-7c649bf6d4-","namespace":"openshift-network-operator","uid":"89fc77c9-b444-4828-8a35-c63ea9335245","resourceVersion":"8781","creationTimestamp":"2026-03-08T03:09:34Z","labels":{"name":"network-operator","pod-template-hash":"7c649bf6d4"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-7c649bf6d4","uid":"fc382009-5673-41e6-9457-3979d47b9a6b","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-6xrfv","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9242604e78efada5aeb232d73a7963f806b754213f5d92b1dffc9b493d7b5a65"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b19b9d0e5437b0bb19cafc3fb516f654c911cdf11184c0de9a27b43c6b80c9ce"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3aa7c84e73a2a19cc9baca38b7e86dfcde579aa88221647c332c83f047d5ae6d"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5bfe4d3125d98cc501d5a529d3ae2497106a2bbb5a6dd06df7c0e0930d168212"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b62afe74fdcb011a4a8c8fa5572dbab2514dda673ae4be4c6beaef92d28216ba"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-6xrfv","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:09:47Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:09:42Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:19:04Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:19:04Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:09:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-08T03:09:42Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-03-08T03:19:03Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0308 03:17:04.727889 1 cmd.go:250] Using service-serving-cert provided certificates\nI0308 03:17:04.728081 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0308 03:17:04.728472 1 observer_polling.go:159] Starting file observer\nW0308 03:18:04.733194 1 builder.go:266] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods network-operator-7c649bf6d4-wxrfp)\nI0308 03:18:04.733406 1 builder.go:298] network-operator version 4.18.0-202602132343.p2.gf63a7ff.assembly.stream.el9-f63a7ff-f63a7ffb316c9ca4359210ff5ea2c003dbe2d6a9\nF0308 03:18:35.216458 1 cmd.go:179] failed checking apiserver connectivity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-operator/leases/network-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-08T03:17:04Z","finishedAt":"2026-03-08T03:18:35Z","containerID":"cri-o://2d1f35ff4fbf411febbede650e49c2bb74f638fdc3d27726c7043dd06f0d5e3d"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","containerID":"cri-o://58762e55602a1be7a4992471d8fa05f5d35714c62436d860681056d609af0404","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-6xrfv","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-ppdzb.json0000640000000000000000000002462615153166056026024 0ustar0000000000000000{"metadata":{"name":"network-node-identity-ppdzb","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"4fd323ae-11bf-4207-bdce-4d51a9c19dc3","resourceVersion":"8349","creationTimestamp":"2026-03-08T03:10:18Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"68cb6fd5b","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"c4ba20a5-08b9-459d-84cc-679e5c826781","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-2ct9j","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-2ct9j","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-2ct9j","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:34Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:16:29Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:16:29Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-08T03:10:18Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-03-08T03:13:40Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"9 1 approver.go:230] Finished syncing CSR csr-l5vzt for master-0 node in 8.412691ms\nI0308 03:10:40.420250 1 approver.go:230] Finished syncing CSR csr-l5vzt for unknown node in 80.512µs\nI0308 03:10:40.427991 1 approver.go:230] Finished syncing CSR csr-l5vzt for unknown node in 90.803µs\nI0308 03:10:52.557511 1 recorder.go:104] \"CSR \\\"csr-94phm\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-94phm\"} reason=\"CSRApproved\"\nI0308 03:10:52.567104 1 approver.go:230] Finished syncing CSR csr-94phm for master-0 node in 10.212429ms\nI0308 03:10:52.567211 1 approver.go:230] Finished syncing CSR csr-94phm for unknown node in 49.151µs\nI0308 03:10:52.579653 1 approver.go:230] Finished syncing CSR csr-94phm for unknown node in 74.612µs\nE0308 03:12:29.000709 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path\nE0308 03:12:44.000854 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0308 03:12:44.000963 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0308 03:12:59.001774 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0308 03:12:59.001983 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2026-03-08T03:10:33Z","finishedAt":"2026-03-08T03:12:59Z","containerID":"cri-o://c5eec4110852b5b6f65ead45beeb23e454a4f0a36ca8d676067c0e98d6a8439c"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","containerID":"cri-o://7ee5b861c39dc6b2389534ffbe109ec1e2487bbf38c2ab8f456f84e12449168e","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-2ct9j","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-03-08T03:10:33Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","containerID":"cri-o://c0ff9b8e2d49218f2727d432756e1a80012d8ae4568b1d0b7bd5499ffddd6b5f","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-2ct9j","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001521215153166056026262 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"2d24931b-24d6-4b4f-973e-cd9e877a0cc1","resourceVersion":"4003","creationTimestamp":"2026-03-08T03:09:48Z","labels":{"k8s-app":"kube-rbac-proxy-crio"},"annotations":{"kubernetes.io/config.hash":"e9add8df47182fc2eaf8cd78016ebe72","kubernetes.io/config.mirror":"e9add8df47182fc2eaf8cd78016ebe72","kubernetes.io/config.seen":"2026-03-08T03:08:59.045967974Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"e5825447-c87e-453a-9919-ced1c52a404c","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-08T03:11:04Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-08T03:09:02Z","finishedAt":"2026-03-08T03:09:02Z","containerID":"cri-o://85f16f93cd690b5924a3bfd91c9387cfb9f04d71df5230de7d45bf3e26eb0168"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://85f16f93cd690b5924a3bfd91c9387cfb9f04d71df5230de7d45bf3e26eb0168","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-03-08T03:09:48Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0308 03:09:19.556102 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0308 03:09:19.556343 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0308 03:09:19.558747 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-03-08T03:09:19Z","finishedAt":"2026-03-08T03:09:19Z","containerID":"cri-o://6641777c0515379fb5521281634350e0ba16889bd714d491e11bd483e3de969d"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://94f9825100c515930737671c9db902b97098151c7357d0a97122a599d22e13f1","started":true}],"qosClass":"Burstable"}}kube-storage-version-migrator-operator-7f65c457f5-7k8j7.json0000640000000000000000000001632315153166056035564 0ustar0000000000000000config/pod/openshift-kube-storage-version-migrator-operator{"metadata":{"name":"kube-storage-version-migrator-operator-7f65c457f5-7k8j7","generateName":"kube-storage-version-migrator-operator-7f65c457f5-","namespace":"openshift-kube-storage-version-migrator-operator","uid":"1d446527-f3fd-4a37-a980-7445031928d1","resourceVersion":"8353","creationTimestamp":"2026-03-08T03:09:34Z","labels":{"app":"kube-storage-version-migrator-operator","pod-template-hash":"7f65c457f5"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.14/23\"],\"mac_address\":\"0a:58:0a:80:00:0e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.14/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.14\"\n ],\n \"mac\": \"0a:58:0a:80:00:0e\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-storage-version-migrator-operator-7f65c457f5","uid":"adb4de8b-e652-4c73-ba9a-caab5af87709","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"config","defaultMode":420}},{"name":"kube-api-access-2qvl4","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-storage-version-migrator-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","command":["cluster-kube-storage-version-migrator-operator","start"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-2qvl4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1001,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-storage-version-migrator-operator","serviceAccount":"kube-storage-version-migrator-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c19,c14"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:18:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:18:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.14","podIPs":[{"ip":"10.128.0.14"}],"startTime":"2026-03-08T03:10:53Z","containerStatuses":[{"name":"kube-storage-version-migrator-operator","state":{"running":{"startedAt":"2026-03-08T03:18:27Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0308 03:16:30.153151 1 cmd.go:253] Using service-serving-cert provided certificates\nI0308 03:16:30.153399 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0308 03:16:30.154025 1 observer_polling.go:159] Starting file observer\nW0308 03:17:30.165957 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nI0308 03:17:30.166177 1 builder.go:304] openshift-kube-storage-version-migrator-operator version 4.18.0-202602132343.p2.g59ba356.assembly.stream.el9-59ba356-59ba356f50ea3128905ffdb7137f868aa0588bab\nF0308 03:18:00.697276 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-storage-version-migrator-operator/leases/openshift-kube-storage-version-migrator-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-08T03:16:30Z","finishedAt":"2026-03-08T03:18:00Z","containerID":"cri-o://b009862d75dae9f3e9089264c59ffc33de04ddd735304db6fbfcc002f9536734"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","containerID":"cri-o://f7da8d6f43578f41e1847ca0341da34176f025a0cb8ed318bf310486d31635fa","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-2qvl4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-zcr8w.json0000640000000000000000000001577515153166056027760 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-68bd585b-zcr8w","generateName":"kube-apiserver-operator-68bd585b-","namespace":"openshift-kube-apiserver-operator","uid":"5a058138-8039-4841-821b-7ee5bb8648e4","resourceVersion":"8789","creationTimestamp":"2026-03-08T03:09:33Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"68bd585b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.21/23\"],\"mac_address\":\"0a:58:0a:80:00:15\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.21/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.21\"\n ],\n \"mac\": \"0a:58:0a:80:00:15\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-68bd585b","uid":"cadd746c-9b9e-429e-9c64-11dcd43d282a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:55Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:19:05Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:19:05Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.21","podIPs":[{"ip":"10.128.0.21"}],"startTime":"2026-03-08T03:10:53Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-03-08T03:19:04Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0308 03:17:04.753033 1 cmd.go:253] Using service-serving-cert provided certificates\nI0308 03:17:04.753140 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0308 03:17:04.754384 1 observer_polling.go:159] Starting file observer\nW0308 03:18:04.764593 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-apiserver-operator-68bd585b-zcr8w)\nI0308 03:18:04.764776 1 builder.go:304] kube-apiserver-operator version 4.18.0-202602132343.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5\nF0308 03:18:35.161604 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-apiserver-operator/leases/kube-apiserver-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-08T03:17:04Z","finishedAt":"2026-03-08T03:18:35Z","containerID":"cri-o://72b1351e9a3c52004d63474cc4899d00eb9ec35191bb77729c1e4a2c5db91758"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","containerID":"cri-o://15751ae441f57c6481deb8b5cc3f72916e46489440f9eb8189b8afd0e24064b8","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-677db989d6-4bpl8.json0000640000000000000000000002432715153166056025267 0ustar0000000000000000{"metadata":{"name":"ingress-operator-677db989d6-4bpl8","generateName":"ingress-operator-677db989d6-","namespace":"openshift-ingress-operator","uid":"197afe92-5912-4e90-a477-e3abe001bbc7","resourceVersion":"10298","creationTimestamp":"2026-03-08T03:09:34Z","labels":{"name":"ingress-operator","pod-template-hash":"677db989d6"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.10/23\"],\"mac_address\":\"0a:58:0a:80:00:0a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.10/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.10\"\n ],\n \"mac\": \"0a:58:0a:80:00:0a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-677db989d6","uid":"d2bfd179-dae9-444a-8e55-bc97fb54020e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-2kd6j","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-2kd6j","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-2kd6j","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:29Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:23:56Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:23:56Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.10","podIPs":[{"ip":"10.128.0.10"}],"startTime":"2026-03-08T03:10:53Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-03-08T03:23:55Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ver (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-08T03:23:26.733Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for webhooks\n2026-03-08T03:23:26.733Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for HTTP servers\nW0308 03:23:26.733464 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.RoleBinding ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0308 03:23:26.733593 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Service ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0308 03:23:26.733668 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Pod ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-08T03:23:26.733Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\n2026-03-08T03:23:26.734Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\nW0308 03:23:26.733464 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Service ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-08T03:23:26.738Z\tINFO\toperator.main\truntime/asm_amd64.s:1695\tfile watch events channel closed\n2026-03-08T03:23:26.738Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"failed to wait for route_metrics_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}\n","startedAt":"2026-03-08T03:21:25Z","finishedAt":"2026-03-08T03:23:26Z","containerID":"cri-o://1d5309bb49bc359c6f650d35b0215dfd107ee09ec728eed9abd6a570ec1d8886"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","containerID":"cri-o://3a03f9a9aafa4fbc2ea827886673fad2a6a9650b76a61f6d3b1c9550a51441f3","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-2kd6j","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-08T03:11:28Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://fb1999a92de1731bb7581c9cab11a88227624768ed8711ac87f7791288dffadd","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-2kd6j","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator-8565d84698-h7lpf.json0000640000000000000000000001661315153166056033376 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-8565d84698-h7lpf","generateName":"openshift-controller-manager-operator-8565d84698-","namespace":"openshift-controller-manager-operator","uid":"0722d9c3-77b8-4770-9171-d4aeba4b0cc7","resourceVersion":"8771","creationTimestamp":"2026-03-08T03:09:33Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"8565d84698"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.25/23\"],\"mac_address\":\"0a:58:0a:80:00:19\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.25/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.25\"\n ],\n \"mac\": \"0a:58:0a:80:00:19\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-8565d84698","uid":"2aaa80d2-c38a-44d6-b469-339bf05d8c0c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-vnvtg","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-vnvtg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c4"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:19:03Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:19:03Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.25","podIPs":[{"ip":"10.128.0.25"}],"startTime":"2026-03-08T03:10:53Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-03-08T03:19:02Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0308 03:17:04.749804 1 cmd.go:253] Using service-serving-cert provided certificates\nI0308 03:17:04.749960 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0308 03:17:04.750373 1 observer_polling.go:159] Starting file observer\nW0308 03:18:04.761179 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-controller-manager-operator-8565d84698-h7lpf)\nI0308 03:18:04.761377 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202602132343.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254\nF0308 03:18:35.008544 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-controller-manager-operator/leases/openshift-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-08T03:17:04Z","finishedAt":"2026-03-08T03:18:35Z","containerID":"cri-o://5143cbadf379a54eeca92346f6f8d879538d415d4167dd1961c3f4a4dfe1810b"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","containerID":"cri-o://c94b73e519e383394ac52486ba137a12e3d62bc0ee65d9b6506885ef4c56113f","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-vnvtg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-config-operator/openshift-config-operator-64488f9d78-d4wnv.json0000640000000000000000000002154115153166056026700 0ustar0000000000000000{"metadata":{"name":"openshift-config-operator-64488f9d78-d4wnv","generateName":"openshift-config-operator-64488f9d78-","namespace":"openshift-config-operator","uid":"bd1bcaff-7dbd-4559-92fc-5453993f643e","resourceVersion":"9102","creationTimestamp":"2026-03-08T03:09:33Z","labels":{"app":"openshift-config-operator","pod-template-hash":"64488f9d78"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.11/23\"],\"mac_address\":\"0a:58:0a:80:00:0b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.11/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.11\"\n ],\n \"mac\": \"0a:58:0a:80:00:0b\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-config-operator-64488f9d78","uid":"869f8ed9-5283-4b81-b061-0cc3feb96191","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"config-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"available-featuregates","emptyDir":{"sizeLimit":"100Mi"}},{"name":"kube-api-access-wplgs","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"openshift-api","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","command":["write-available-featuresets","--asset-output-dir=/available-featuregates","--payload-version=$(OPERATOR_IMAGE_VERSION)"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-wplgs","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"containers":[{"name":"openshift-config-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","command":["cluster-config-operator","operator","--operator-version=$(OPERATOR_IMAGE_VERSION)","--authoritative-feature-gate-dir=/available-featuregates"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-wplgs","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-config-operator","serviceAccount":"openshift-config-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c9"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:05Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:19:32Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:19:32Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.11","podIPs":[{"ip":"10.128.0.11"}],"startTime":"2026-03-08T03:10:53Z","initContainerStatuses":[{"name":"openshift-api","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-08T03:11:05Z","finishedAt":"2026-03-08T03:11:05Z","containerID":"cri-o://9e265e782cf76f9516c413e6f08b3615e452acde7fee6964c9dbc229a25efa6c"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","containerID":"cri-o://9e265e782cf76f9516c413e6f08b3615e452acde7fee6964c9dbc229a25efa6c","started":false,"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-wplgs","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"openshift-config-operator","state":{"running":{"startedAt":"2026-03-08T03:19:27Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0308 03:18:35.779890 1 cmd.go:250] Using service-serving-cert provided certificates\nI0308 03:18:35.780136 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0308 03:18:35.781070 1 observer_polling.go:159] Starting file observer\nI0308 03:18:42.024875 1 builder.go:298] config-operator version 4.18.0-202602132343.p2.gfe5e928.assembly.stream.el9-fe5e928-fe5e928628200b49a07aa50e4dfa634fb9452607\nI0308 03:18:45.016237 1 cmd.go:138] Received SIGTERM or SIGINT signal, shutting down controller.\nF0308 03:18:45.016461 1 cmd.go:179] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-config-operator/leases/config-operator-lock\": context canceled\n","startedAt":"2026-03-08T03:18:35Z","finishedAt":"2026-03-08T03:18:45Z","containerID":"cri-o://baddc749e42f097718aa35b36ad713f89e081e60f5274e4f8ef3d143389a47d9"}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","containerID":"cri-o://3ffe89ef5d1c010872dcc8d98905a0b3c74a65a6e59320222ab4708980d7907c","started":true,"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-wplgs","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-operator-5685fbc7d-xbrdp.json0000640000000000000000000001604515153166056032226 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-operator-5685fbc7d-xbrdp","generateName":"csi-snapshot-controller-operator-5685fbc7d-","namespace":"openshift-cluster-storage-operator","uid":"3d69f101-60a8-41fd-bcda-4eb654c626a2","resourceVersion":"8701","creationTimestamp":"2026-03-08T03:09:33Z","labels":{"app":"csi-snapshot-controller-operator","pod-template-hash":"5685fbc7d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.6/23\"],\"mac_address\":\"0a:58:0a:80:00:06\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.6/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.6\"\n ],\n \"mac\": \"0a:58:0a:80:00:06\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-operator-5685fbc7d","uid":"3c95f609-56b5-4e7f-a778-8bf715d49cb5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-8gnng","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"csi-snapshot-controller-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3","args":["start","-v=2"],"env":[{"name":"OPERAND_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1"},{"name":"WEBHOOK_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5e9989ee0577e930adcd97085176343a881bf92537dda1bf0325a3b1faf96d6"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"65Mi"}},"volumeMounts":[{"name":"kube-api-access-8gnng","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000180000,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller-operator","serviceAccount":"csi-snapshot-controller-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c12"},"runAsNonRoot":true,"fsGroup":1000180000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:04Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:18:48Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:18:48Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.6","podIPs":[{"ip":"10.128.0.6"}],"startTime":"2026-03-08T03:10:53Z","containerStatuses":[{"name":"csi-snapshot-controller-operator","state":{"running":{"startedAt":"2026-03-08T03:18:47Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"W0308 03:17:04.763971 1 cmd.go:254] Using insecure, self-signed certificates\nI0308 03:17:04.764348 1 crypto.go:601] Generating new CA for csi-snapshot-controller-operator-signer@1772939824 cert, and key in /tmp/serving-cert-3323672258/serving-signer.crt, /tmp/serving-cert-3323672258/serving-signer.key\nI0308 03:17:04.984236 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0308 03:17:04.984627 1 observer_polling.go:159] Starting file observer\nW0308 03:18:04.997859 1 builder.go:266] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods csi-snapshot-controller-operator-5685fbc7d-xbrdp)\nI0308 03:18:04.998212 1 builder.go:298] csi-snapshot-controller-operator version -\nI0308 03:18:05.000114 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/tmp/serving-cert-3323672258/tls.crt::/tmp/serving-cert-3323672258/tls.key\"\nF0308 03:18:35.222804 1 cmd.go:179] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-cluster-storage-operator/leases/csi-snapshot-controller-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-08T03:17:04Z","finishedAt":"2026-03-08T03:18:35Z","containerID":"cri-o://35a84530b9b77d1b843b53e9598fc2ad2b53c4132c228552e8ac9e5d303df9ce"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3","containerID":"cri-o://c2ca8d040bfba75b786491a7f494a16b01e68ff5762368d65a86118d64a49cb6","started":true,"volumeMounts":[{"name":"kube-api-access-8gnng","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-7577d6f48-kfmd9.json0000640000000000000000000001401515153166056030133 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-7577d6f48-kfmd9","generateName":"csi-snapshot-controller-7577d6f48-","namespace":"openshift-cluster-storage-operator","uid":"9fb588a9-6240-4513-8e4b-248eb43d3f06","resourceVersion":"9608","creationTimestamp":"2026-03-08T03:11:06Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"7577d6f48"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.27/23\"],\"mac_address\":\"0a:58:0a:80:00:1b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.27/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.27\"\n ],\n \"mac\": \"0a:58:0a:80:00:1b\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-7577d6f48","uid":"5eb87077-638a-49a2-96a9-1626788e41b3","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-5d8xq","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-5d8xq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000180000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c12"},"runAsNonRoot":true,"fsGroup":1000180000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:10Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:06Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:19:38Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:19:38Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.27","podIPs":[{"ip":"10.128.0.27"}],"startTime":"2026-03-08T03:11:06Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2026-03-08T03:19:37Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"I0308 03:18:27.501440 1 feature_gate.go:387] feature gates: {map[]}\nI0308 03:18:27.501619 1 main.go:169] Version: a3681c9bbf7c01e13d6bf97ae0384460950c97ec\nI0308 03:18:27.502691 1 main.go:220] Start NewCSISnapshotController with kubeconfig [] resyncPeriod [15m0s]\nE0308 03:18:57.506693 1 main.go:98] Failed to list v1 volumesnapshots with error=Get \"https://172.30.0.1:443/apis/snapshot.storage.k8s.io/v1/volumesnapshots?limit=1\": context deadline exceeded\nE0308 03:18:57.506763 1 main.go:246] Exiting due to failure to ensure CRDs exist during startup: context deadline exceeded\n","startedAt":"2026-03-08T03:18:27Z","finishedAt":"2026-03-08T03:18:57Z","containerID":"cri-o://5d5ab4a36feb6e5428f4fe82fd02d1bf53851b6363e11c4e53ba7fc20e220f93"}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","containerID":"cri-o://bf37b1d91d00a86f3f5cd7c16070ea9424642dc69ceced0dc38c369c92d986f3","started":true,"volumeMounts":[{"name":"kube-api-access-5d8xq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-66c7586884-c4zs4.json0000640000000000000000000002055315153166056031631 0ustar0000000000000000{"metadata":{"name":"cluster-node-tuning-operator-66c7586884-c4zs4","generateName":"cluster-node-tuning-operator-66c7586884-","namespace":"openshift-cluster-node-tuning-operator","uid":"103158c5-c99f-4224-bf5a-e23b1aaf9172","resourceVersion":"8326","creationTimestamp":"2026-03-08T03:09:35Z","labels":{"name":"cluster-node-tuning-operator","pod-template-hash":"66c7586884"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.9/23\"],\"mac_address\":\"0a:58:0a:80:00:09\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.9/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.9\"\n ],\n \"mac\": \"0a:58:0a:80:00:09\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-node-tuning-operator-66c7586884","uid":"af454182-1d1a-400c-b9fa-75bda1c994dc","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"node-tuning-operator-tls","secret":{"secretName":"node-tuning-operator-tls","defaultMode":420}},{"name":"apiservice-cert","secret":{"secretName":"performance-addon-operator-webhook-cert","items":[{"key":"tls.crt","path":"apiserver.crt"},{"key":"tls.key","path":"apiserver.key"}],"defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420,"optional":true}},{"name":"kube-api-access-m5pgg","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-node-tuning-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","command":["cluster-node-tuning-operator"],"args":["-v=0"],"ports":[{"name":"metrics","containerPort":60000,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"RESYNC_PERIOD","value":"600"},{"name":"CLUSTER_NODE_TUNED_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"node-tuning-operator-tls","mountPath":"/etc/secrets"},{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"kube-api-access-m5pgg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"readOnlyRootFilesystem":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-node-tuning-operator","serviceAccount":"cluster-node-tuning-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c15,c10"},"runAsUser":499,"runAsNonRoot":true},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:21Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:18:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:18:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:10:53Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.9","podIPs":[{"ip":"10.128.0.9"}],"startTime":"2026-03-08T03:10:53Z","containerStatuses":[{"name":"cluster-node-tuning-operator","state":{"running":{"startedAt":"2026-03-08T03:17:04Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ler\":\"performanceprofile\",\"controllerGroup\":\"performance.openshift.io\",\"controllerKind\":\"PerformanceProfile\"}\nI0308 03:11:20.259437 1 controller.go:1443] started events processor/controller\nI0308 03:11:20.279857 1 server.go:104] starting metrics server\nI0308 03:11:20.300486 1 controller.go:653] created profile master-0 [openshift-control-plane]\n{\"level\":\"info\",\"ts\":\"2026-03-08T03:11:20Z\",\"msg\":\"Starting workers\",\"controller\":\"performanceprofile\",\"controllerGroup\":\"performance.openshift.io\",\"controllerKind\":\"PerformanceProfile\",\"worker count\":1}\nE0308 03:12:54.190485 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0308 03:13:54.193583 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-node-tuning-operator/node-tuning-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io node-tuning-operator-lock)\nE0308 03:15:28.198168 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0308 03:16:20.186433 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-node-tuning-operator/node-tuning-operator-lock: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-cluster-node-tuning-operator/leases/node-tuning-operator-lock\": context deadline exceeded\nI0308 03:16:20.186495 1 leaderelection.go:297] failed to renew lease openshift-cluster-node-tuning-operator/node-tuning-operator-lock: timed out waiting for the condition\nE0308 03:16:54.192991 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nF0308 03:16:54.193166 1 main.go:242] manager exited with non-zero code: leader election lost\n","startedAt":"2026-03-08T03:11:20Z","finishedAt":"2026-03-08T03:16:54Z","containerID":"cri-o://a90adc87011fbb7cd1968febcefc0ce682e90d9df30e52bef5969b7cab457d60"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","containerID":"cri-o://7828a0e0fa2706d250ad69378649c5fb641ba621ee124550bb4757af01298f2e","started":true,"volumeMounts":[{"name":"node-tuning-operator-tls","mountPath":"/etc/secrets"},{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"kube-api-access-m5pgg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/catalogd-controller-manager-7f8b8b6f4c-rjwdp.json0000640000000000000000000002537715153166056026137 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-7f8b8b6f4c-rjwdp","generateName":"catalogd-controller-manager-7f8b8b6f4c-","namespace":"openshift-catalogd","uid":"7074cf90-9aa5-41ab-a4c4-c3e1a1044c1b","resourceVersion":"8335","creationTimestamp":"2026-03-08T03:11:34Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"7f8b8b6f4c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.42/23\"],\"mac_address\":\"0a:58:0a:80:00:2a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.42/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.42\"\n ],\n \"mac\": \"0a:58:0a:80:00:2a\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-7f8b8b6f4c","uid":"59e6627b-5aea-4dcb-b1c2-2e4a0a1c49d5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-c72dm","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-c72dm","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-c72dm","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:35Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:18:11Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:18:11Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:35Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.42","podIPs":[{"ip":"10.128.0.42"}],"startTime":"2026-03-08T03:11:35Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-08T03:11:36Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://bdcefdd75b70a05e06ef82c47f20ca576f0969ce90111e774b57c7400f29d26f","started":true,"volumeMounts":[{"name":"kube-api-access-c72dm","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-08T03:15:22Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"tplace\" reconcileID=\"9fbbc610-846c-482a-a9d7-0de3a5bc950f\" layer=0\nI0308 03:13:31.674242 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"9fbbc610-846c-482a-a9d7-0de3a5bc950f\" layer=1\nI0308 03:13:31.939990 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"9fbbc610-846c-482a-a9d7-0de3a5bc950f\" layer=2\nI0308 03:13:34.473781 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"9fbbc610-846c-482a-a9d7-0de3a5bc950f\" layer=3\nI0308 03:13:35.614049 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"9fbbc610-846c-482a-a9d7-0de3a5bc950f\" layer=4\nE0308 03:13:36.972645 1 leaderelection.go:436] error retrieving resource lock openshift-catalogd/catalogd-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io catalogd-operator-lock)\nI0308 03:13:49.967601 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE0308 03:13:49.967717 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-08T03:11:36Z","finishedAt":"2026-03-08T03:13:49Z","containerID":"cri-o://847ec71b717fbc403d7670e2fb6fcb0eb16c5961bfffd67ba80ebb137144703d"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","containerID":"cri-o://d67b7c07c51ae55685846daed44be4e4bc31d9601f7c2247d08f667ff264cd33","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-c72dm","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515153166056023225 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115153166056025435 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715153166056025144 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715153166056025135 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315153166056022255 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515153166056026711 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115153166056023414 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115153166056023210 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115153166056025500 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- aggregated/ingress_controllers_certs.json0000640000000000000000000000045715153166056017543 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-03-08T03:11:28Z","not_after":"2028-03-07T03:11:29Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-03-08T03:11:29Z","not_after":"2028-03-07T03:11:30Z","controllers":[]}]events/openshift-cluster-version.json0000640000000000000000000002156215153166056016616 0ustar0000000000000000{"items":[{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:05:16Z","reason":"LeaderElection","message":"master-0_cada8ff2-561c-4f44-857d-300b5dec0ba3 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:05:18Z","reason":"LeaderElection","message":"master-0_cada8ff2-561c-4f44-857d-300b5dec0ba3 stopped leading","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:05:19Z","reason":"LeaderElection","message":"master-0_7d9a3892-180f-4236-b16d-3580b89b1e2c became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:05:21Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-version-operator-745944c6b7 to 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:05:38Z","reason":"LeaderElection","message":"master-0_931ced56-47c3-4f71-8ffe-63162a639046 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:05:40Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:05:40Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:05:42Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:06:02Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-version-operator-745944c6b7-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:09:31Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-version-operator-745944c6b7-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:09:34Z","reason":"SuccessfulCreate","message":"Created pod: cluster-version-operator-745944c6b7-rs4ld","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:10:45Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"cluster-version-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:12Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"cluster-version-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:20Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:28Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:28Z","reason":"LeaderElection","message":"master-0_698e9c01-6e0c-44e5-baaa-cdd0ade31dfc became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:28Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:28Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\" in 7.123s (7.123s including waiting). Image size: 517997625 bytes.","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:30Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:30Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:32Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:43Z","reason":"SuccessfulDelete","message":"Deleted pod: cluster-version-operator-745944c6b7-rs4ld","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:43Z","reason":"ScalingReplicaSet","message":"Scaled down replica set cluster-version-operator-745944c6b7 to 0 from 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:43Z","reason":"Killing","message":"Stopping container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:47Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-version-operator-8c9c967c7 to 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:47Z","reason":"SuccessfulCreate","message":"Created pod: cluster-version-operator-8c9c967c7-mhw86","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:48Z","reason":"LeaderElection","message":"master-0_6d8a1668-05c4-4cd2-ad99-b95ef1ef2623 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:50Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:50Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:11:51Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:18:27Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\" already present on machine","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:18:27Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:18:27Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:23:34Z","reason":"LeaderElection","message":"master-0_16f33635-e106-4f83-83ac-75fe86ff4b45 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:23:36Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:23:36Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-08T03:23:38Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\" architecture=\"amd64\"","type":"Normal"}]}config/pod/openshift-cluster-version/cluster-version-operator-8c9c967c7-mhw86.json0000640000000000000000000001373415153166056026553 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-8c9c967c7-mhw86","generateName":"cluster-version-operator-8c9c967c7-","namespace":"openshift-cluster-version","uid":"d2a53f3b-7e22-47eb-9f28-da3441b3662f","resourceVersion":"8356","creationTimestamp":"2026-03-08T03:11:47Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"8c9c967c7"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-8c9c967c7","uid":"14dc82e6-3e55-4319-9603-43e2438c81eb","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:47Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:18:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:18:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T03:11:47Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-08T03:11:47Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-03-08T03:18:27Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-08T03:11:48Z","finishedAt":"2026-03-08T03:18:22Z","containerID":"cri-o://50e75d2b6ff206804802c9331065b3194c6e165af0a4d329ce7b16d5dd4ec36b"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","containerID":"cri-o://24db9ff0b4f3a843d44fe7f7cb6ef1e2e1973a49778543d03a6faa68fce36a95","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415153166056011032 0ustar0000000000000000e9cada4c-3bef-405d-85f1-fd6f30fac26aconfig/version.json0000640000000000000000000000675115153166056013106 0ustar0000000000000000{"metadata":{"name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","resourceVersion":"12132","generation":2,"creationTimestamp":"2026-03-08T03:05:08Z"},"spec":{"clusterID":"e9cada4c-3bef-405d-85f1-fd6f30fac26a","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.34","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","url":"https://access.redhat.com/errata/RHSA-2026:2977","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","fast-4.19","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-03-08T03:05:42Z","completionTime":null,"version":"4.18.34","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","verified":false}],"observedGeneration":2,"versionHash":"p13mOMOOYQo=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-03-08T03:05:42Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-03-08T03:05:42Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-03-08T03:05:42Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-03-08T03:05:42Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-03-08T03:05:42Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-03-08T03:24:08Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, image-registry, kube-apiserver, kube-controller-manager, kube-scheduler, monitoring, openshift-apiserver, openshift-samples, operator-lifecycle-manager-packageserver are not available\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 908): the server is down or not responding\n* Could not update oauthclient \"console\" (550 of 908): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (825 of 908): resource may have been deleted\n* Could not update role \"openshift-console/prometheus-k8s\" (829 of 908): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T03:05:42Z","reason":"MultipleErrors","message":"Unable to apply 4.18.34: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315153166056023452 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"41702c8d-85a1-40cf-9894-50ced9dc00b1","resourceVersion":"4173","generation":1,"creationTimestamp":"2026-03-08T03:11:06Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015153166056022055 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"24b94a4b-12b1-42d9-b537-73a4e6df2a8a","resourceVersion":"4157","generation":1,"creationTimestamp":"2026-03-08T03:11:06Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-08T03:11:06Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215153166056020204 0ustar0000000000000000[]cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002231415153166056025504 0ustar0000000000000000{"metadata":{"name":"edit","uid":"1b07230c-99e8-470d-83d9-b9bf58ccccc0","resourceVersion":"11205","creationTimestamp":"2026-03-08T03:04:09Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002520115153166056025645 0ustar0000000000000000{"metadata":{"name":"admin","uid":"2757c494-191a-40e3-aef8-7a39d962f03a","resourceVersion":"11216","creationTimestamp":"2026-03-08T03:04:09Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/authentication.json0000640000000000000000000000132415153166056014427 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"01d48cca-93a1-4537-b75b-2616bbc5d823","resourceVersion":"10231","generation":2,"creationTimestamp":"2026-03-08T03:05:51Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63"}]},"spec":{"type":"","oauthMetadata":{"name":""},"webhookTokenAuthenticator":{"kubeConfig":{"name":"webhook-authentication-integrated-oauth"}},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115153166056027756 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"98b3fa65-37b3-4513-a6ce-7e7a7a98af78","resourceVersion":"6160","generation":1,"creationTimestamp":"2026-03-08T03:11:28Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T03:11:29Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-03-08T03:11:29Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-03-08T03:11:29Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T03:11:29Z","reason":"AsExpected"}]}}config/validatingwebhookconfigurations/prometheusrules.openshift.io.json0000640000000000000000000000511515153166056025740 0ustar0000000000000000{"metadata":{"name":"prometheusrules.openshift.io","uid":"4e0df58e-d4cb-4b07-859e-9a5a0236da33","resourceVersion":"10974","generation":2,"creationTimestamp":"2026-03-08T03:24:11Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"prometheusrules.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-prometheusrules/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1"],"resources":["prometheusrules"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115153166056025304 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"7f232fde-9434-4bd8-b3c2-7ec6a502ebf6","resourceVersion":"4879","generation":2,"creationTimestamp":"2026-03-08T03:06:10Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515153166056026743 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"a6b93181-edb4-4e53-9ef8-f1c13971c5f7","resourceVersion":"7116","generation":1,"creationTimestamp":"2026-03-08T03:11:43Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"1a16df56-9cf1-4057-9d9d-5804a847cbe1","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715153166056024031 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"c8ee02bb-643b-4aff-ac6c-70d7db940457","resourceVersion":"4882","generation":2,"creationTimestamp":"2026-03-08T03:10:02Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"1a16df56-9cf1-4057-9d9d-5804a847cbe1","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537315153166056030644 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"f73a0892-0ca4-44a9-b5b6-5bd5c35bace9","resourceVersion":"11471","generation":2,"creationTimestamp":"2026-03-08T03:24:30Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500215153166056032115 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"51772643-84ad-46ea-bdfb-e74fddd1cd88","resourceVersion":"10973","generation":2,"creationTimestamp":"2026-03-08T03:23:58Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102715153166056025002 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"a47c3ae2-ce35-49cc-a481-f8774fedd0a6","resourceVersion":"11489","generation":2,"creationTimestamp":"2026-03-08T03:24:31Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io.json0000640000000000000000000000514315153166056026506 0ustar0000000000000000{"metadata":{"name":"alertmanagerconfigs.openshift.io","uid":"2c8023d4-8f1d-4c19-9ad0-09dd93a7da4d","resourceVersion":"10975","generation":2,"creationTimestamp":"2026-03-08T03:24:11Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"alertmanagerconfigs.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-alertmanagerconfigs/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1alpha1"],"resources":["alertmanagerconfigs"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/oauth.json0000640000000000000000000000114415153166056012530 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"be3d4f50-4c68-4e15-be76-49b3744faf04","resourceVersion":"1734","generation":1,"creationTimestamp":"2026-03-08T03:06:01Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/schedulers/cluster.json0000640000000000000000000000052415153166056015233 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"7127ec06-4921-49a7-8783-f23edce02cf6","resourceVersion":"567","generation":1,"creationTimestamp":"2026-03-08T03:05:05Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}events/openshift-machine-api.json0000640000000000000000000000136115153166056015620 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-08T03:24:03Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"control-plane-machine-set-operator-tls\" : secret \"control-plane-machine-set-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-08T03:24:12Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : secret \"cluster-autoscaler-operator-cert\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-08T03:24:14Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"machine-api-operator-tls\" : secret \"machine-api-operator-tls\" not found","type":"Warning"}]}config/proxy.json0000640000000000000000000000031315153166056012566 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"6d436ac6-5bb0-41e1-85eb-16b77781df0a","resourceVersion":"561","generation":1,"creationTimestamp":"2026-03-08T03:05:04Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/machinehealthchecks/openshift-machine-api/machine-api-termination-handler.json0000640000000000000000000000163315153166056027653 0ustar0000000000000000{"apiVersion":"machine.openshift.io/v1beta1","kind":"MachineHealthCheck","metadata":{"annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"creationTimestamp":"2026-03-08T03:25:00Z","generation":1,"labels":{"api":"clusterapi","k8s-app":"termination-handler"},"name":"machine-api-termination-handler","namespace":"openshift-machine-api","ownerReferences":[{"apiVersion":"config.openshift.io/v1","controller":true,"kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63"}],"resourceVersion":"11956","uid":"3c1259df-5004-4811-b19a-9e69105058b0"},"spec":{"maxUnhealthy":"100%","nodeStartupTimeout":"0","selector":{"matchLabels":{"machine.openshift.io/interruptible-instance":""}},"unhealthyConditions":[{"status":"True","timeout":"0s","type":"Terminating"}]}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173515153166056025130 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"e551c6a9-6201-4ddb-925f-899a6c766f2b","resourceVersion":"7718","generation":1,"creationTimestamp":"2026-03-08T03:06:00Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-03-08T03:11:51Z","reason":"SufficientPods","message":""}]}}config/infrastructure.json0000640000000000000000000000106515153166056014472 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"bcbee023-c54a-4bf6-9f7f-0cb5abc89386","resourceVersion":"543","generation":1,"creationTimestamp":"2026-03-08T03:05:02Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/ingress.json0000640000000000000000000000043615153166056013065 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"0654635d-53be-4ddc-82c8-5e2667960afa","resourceVersion":"558","generation":1,"creationTimestamp":"2026-03-08T03:05:03Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/network.json0000640000000000000000000000117015153166056013100 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"ce47d963-a481-4ba5-ba73-e949c135a4a2","resourceVersion":"3323","generation":2,"creationTimestamp":"2026-03-08T03:05:04Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/machineconfigpools/worker.json0000640000000000000000000001013515153166056016570 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-08T03:23:59Z","generation":2,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"11036","uid":"6b3b5ed3-9c0a-482d-9efb-6efafa46cee0"},"spec":{"configuration":{"name":"rendered-worker-becd8e457b9b3daca15ad980f999f2f0","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-05T02:54:35Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-09T03:01:08Z","subject":"CN=kube-csr-signer_@1772939469"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-09T03:01:08Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-08T03:01:09Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-08T03:01:08Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-05T03:01:06Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-08T03:10:56Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1772939456"}],"conditions":[{"lastTransitionTime":"2026-03-08T03:24:13Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-03-08T03:24:18Z","message":"All nodes are updated with MachineConfig rendered-worker-becd8e457b9b3daca15ad980f999f2f0","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2026-03-08T03:24:18Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-03-08T03:24:18Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-03-08T03:24:18Z","message":"","reason":"","status":"False","type":"Degraded"}],"configuration":{"name":"rendered-worker-becd8e457b9b3daca15ad980f999f2f0","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"degradedMachineCount":0,"machineCount":0,"observedGeneration":2,"readyMachineCount":0,"unavailableMachineCount":0,"updatedMachineCount":0}}config/machineconfigpools/master.json0000640000000000000000000001241015153166056016550 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-08T03:23:59Z","generation":2,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"11039","uid":"3b7ade1a-4507-4307-8e19-e5676cc30a40"},"spec":{"configuration":{"name":"rendered-master-bc6bfb4764e126da413b020ccd1d8bd2","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-05T02:54:35Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-09T03:01:08Z","subject":"CN=kube-csr-signer_@1772939469"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-09T03:01:08Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-08T03:01:09Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-08T03:01:08Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-05T03:01:06Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-08T03:10:56Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1772939456"}],"conditions":[{"lastTransitionTime":"2026-03-08T03:24:13Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-03-08T03:24:18Z","message":"All nodes are updated with MachineConfig rendered-master-bc6bfb4764e126da413b020ccd1d8bd2","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2026-03-08T03:24:18Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-03-08T03:24:18Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-03-08T03:24:18Z","message":"","reason":"","status":"False","type":"Degraded"}],"configuration":{"name":"rendered-master-bc6bfb4764e126da413b020ccd1d8bd2","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"degradedMachineCount":0,"machineCount":1,"observedGeneration":2,"readyMachineCount":1,"unavailableMachineCount":0,"updatedMachineCount":1}}config/image.json0000640000000000000000000000111715153166056012472 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"95113cbb-054a-4745-9dae-a7b733606202","resourceVersion":"1603","generation":1,"creationTimestamp":"2026-03-08T03:05:59Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/node/master-0.json0000640000000000000000000000703115153166056013766 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"e5825447-c87e-453a-9919-ced1c52a404c","resourceVersion":"12146","creationTimestamp":"2026-03-08T03:09:32Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node-role.kubernetes.io/worker":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","machineconfiguration.openshift.io/controlPlaneTopology":"SingleReplica","machineconfiguration.openshift.io/currentConfig":"rendered-master-bc6bfb4764e126da413b020ccd1d8bd2","machineconfiguration.openshift.io/desiredConfig":"rendered-master-bc6bfb4764e126da413b020ccd1d8bd2","machineconfiguration.openshift.io/desiredDrain":"uncordon-rendered-master-bc6bfb4764e126da413b020ccd1d8bd2","machineconfiguration.openshift.io/lastAppliedDrain":"uncordon-rendered-master-bc6bfb4764e126da413b020ccd1d8bd2","machineconfiguration.openshift.io/lastObservedServerCAAnnotation":"false","machineconfiguration.openshift.io/lastSyncedControllerConfigResourceVersion":"11064","machineconfiguration.openshift.io/reason":"","machineconfiguration.openshift.io/state":"Done","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{},"status":{"capacity":{"cpu":"12","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"32865356Ki","pods":"250"},"allocatable":{"cpu":"11500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"31714380Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-03-08T03:25:32Z","lastTransitionTime":"2026-03-08T03:09:32Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-03-08T03:25:32Z","lastTransitionTime":"2026-03-08T03:09:32Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-03-08T03:25:32Z","lastTransitionTime":"2026-03-08T03:09:32Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-03-08T03:25:32Z","lastTransitionTime":"2026-03-08T03:10:53Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.111.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202602172219-0","containerRuntimeVersion":"cri-o://1.31.13-8.rhaos4.18.gitd78977c.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"runc","features":{"recursiveReadOnlyMounts":true}},{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}}]}}config/featuregate.json0000640000000000000000000000613615153166056013712 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"6453d237-784d-448e-bcc8-72b5527c8020","resourceVersion":"651","generation":1,"creationTimestamp":"2026-03-08T03:05:24Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.34","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/apiserver.json0000640000000000000000000000121615153166056013410 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"466a34c1-181f-414d-ae28-43b0d93bf1ec","resourceVersion":"941","generation":1,"creationTimestamp":"2026-03-08T03:05:45Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c5eb3c8e-ddb3-4ea1-83ed-69db974b2a63"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615153166056027506 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"3da182c7-bc88-485d-ab1d-ebeada6edf80","resourceVersion":"5923","generation":2,"creationTimestamp":"2026-03-08T03:11:25Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}