--- apiVersion: apps/v1 items: - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "2" operator.openshift.io/spec-hash: 19a357946fc6dbd099a9f796b18efbcb26cf5d798e07daaa5d3a81d8f1cc875b release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-19T11:54:09Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 5576c989bb managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"66bb8946-29b8-4178-a446-0df9a2fcb16d"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-19T11:54:11Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-19T11:54:11Z" name: controller-manager-5576c989bb namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 66bb8946-29b8-4178-a446-0df9a2fcb16d resourceVersion: "4735" uid: 8baccd4b-81ff-42aa-9314-d21513da39a2 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 5576c989bb template: metadata: annotations: configmaps/client-ca: "0" configmaps/config: "4504" configmaps/openshift-global-ca: "4508" configmaps/openshift-service-ca: "4505" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 5576c989bb name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "5" operator.openshift.io/spec-hash: 8e0526b5b172ec6121f6333103ef19a276139b22b30b80083f8cbba27605ded8 release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-19T11:54:47Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 67c499876f managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"66bb8946-29b8-4178-a446-0df9a2fcb16d"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-19T11:55:07Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-19T11:55:07Z" name: controller-manager-67c499876f namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 66bb8946-29b8-4178-a446-0df9a2fcb16d resourceVersion: "8730" uid: cdca1547-7857-4305-a294-fbfb6bcd2c43 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 67c499876f template: metadata: annotations: configmaps/client-ca: "6720" configmaps/config: "6717" configmaps/openshift-global-ca: "4511" configmaps/openshift-service-ca: "5700" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 67c499876f name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "4" operator.openshift.io/spec-hash: bb920dfef37678ac763de6df63e9d733680114cc047b4cfee13e963e402b2ed6 release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-19T11:54:27Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 69dc5c9779 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"66bb8946-29b8-4178-a446-0df9a2fcb16d"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-19T11:54:47Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-19T11:54:47Z" name: controller-manager-69dc5c9779 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 66bb8946-29b8-4178-a446-0df9a2fcb16d resourceVersion: "6750" uid: 420136fc-5919-4001-b12e-5000b440529d spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 69dc5c9779 template: metadata: annotations: configmaps/client-ca: "5768" configmaps/config: "5766" configmaps/openshift-global-ca: "4511" configmaps/openshift-service-ca: "5700" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 69dc5c9779 name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "6" operator.openshift.io/spec-hash: a6a89077d78d0a3e73920dc21585e74fa1a26bcbe7c5c1ab5c394a785e549846 release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-19T11:55:07Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 79589db566 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"66bb8946-29b8-4178-a446-0df9a2fcb16d"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-19T12:11:00Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-19T12:11:00Z" name: controller-manager-79589db566 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 66bb8946-29b8-4178-a446-0df9a2fcb16d resourceVersion: "16747" uid: e417a8ec-6d13-46f8-a803-58fffc5ccf35 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 79589db566 template: metadata: annotations: configmaps/client-ca: "6720" configmaps/config: "8684" configmaps/openshift-global-ca: "4511" configmaps/openshift-service-ca: "5700" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 79589db566 name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "3" operator.openshift.io/spec-hash: 005148f492b01ed7490e823ecd0c0504fd0be0847ba69d2e8d73e07f7809745f release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-19T11:54:11Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 7fd69bc8f7 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"66bb8946-29b8-4178-a446-0df9a2fcb16d"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-19T11:54:27Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-19T11:54:27Z" name: controller-manager-7fd69bc8f7 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 66bb8946-29b8-4178-a446-0df9a2fcb16d resourceVersion: "5798" uid: 57718e53-28b9-4455-8677-1a02a0cd3a68 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 7fd69bc8f7 template: metadata: annotations: configmaps/client-ca: "0" configmaps/config: "4714" configmaps/openshift-global-ca: "4511" configmaps/openshift-service-ca: "4505" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 7fd69bc8f7 name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "7" operator.openshift.io/spec-hash: e432f4bbac65e736124b3b65c6d2a60c635fe8009f629866a41d97a455cf3526 release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-19T12:11:00Z" generation: 2 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: c85478bc8 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"66bb8946-29b8-4178-a446-0df9a2fcb16d"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-19T12:11:00Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:availableReplicas: {} f:fullyLabeledReplicas: {} f:observedGeneration: {} f:readyReplicas: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-19T12:11:04Z" name: controller-manager-c85478bc8 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 66bb8946-29b8-4178-a446-0df9a2fcb16d resourceVersion: "16817" uid: 03a27bad-6084-49b5-8bd8-92af0f5c5075 spec: replicas: 1 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: c85478bc8 template: metadata: annotations: configmaps/client-ca: "6720" configmaps/config: "16703" configmaps/openshift-global-ca: "4511" configmaps/openshift-service-ca: "5700" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "3" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: c85478bc8 name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: availableReplicas: 1 fullyLabeledReplicas: 1 observedGeneration: 2 readyReplicas: 1 replicas: 1 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "1" operator.openshift.io/spec-hash: eb74a140facf31321ed8c3241c4770fc72894dada953d6cb980d488a3008ff0b release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-19T11:54:07Z" generation: 2 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: f5df8899c managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"66bb8946-29b8-4178-a446-0df9a2fcb16d"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-19T11:54:09Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-19T11:54:09Z" name: controller-manager-f5df8899c namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 66bb8946-29b8-4178-a446-0df9a2fcb16d resourceVersion: "4532" uid: f820576c-c0e2-49da-91cf-07975b27ea39 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: f5df8899c template: metadata: annotations: configmaps/client-ca: "0" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "1" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: f5df8899c name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 2 replicas: 0 kind: ReplicaSetList metadata: resourceVersion: "51664"